@seamapi/types 1.805.0 → 1.806.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/connect.cjs +7 -7
- package/dist/connect.cjs.map +1 -1
- package/dist/connect.d.cts +5 -5
- package/dist/index.cjs +7 -7
- package/dist/index.cjs.map +1 -1
- package/lib/seam/connect/models/acs/acs-access-group.js +1 -1
- package/lib/seam/connect/models/acs/acs-encoder.js +1 -1
- package/lib/seam/connect/models/acs/acs-users/acs-user.js +1 -1
- package/lib/seam/connect/openapi.js +4 -4
- package/lib/seam/connect/openapi.js.map +1 -1
- package/lib/seam/connect/route-types.d.ts +5 -5
- package/package.json +1 -1
- package/src/lib/seam/connect/models/acs/acs-access-group.ts +1 -1
- package/src/lib/seam/connect/models/acs/acs-encoder.ts +1 -1
- package/src/lib/seam/connect/models/acs/acs-users/acs-user.ts +1 -1
- package/src/lib/seam/connect/openapi.ts +4 -4
- package/src/lib/seam/connect/route-types.ts +5 -5
|
@@ -18080,7 +18080,7 @@ export type Routes = {
|
|
|
18080
18080
|
|
|
18081
18081
|
Some access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
|
|
18082
18082
|
|
|
18083
|
-
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
18083
|
+
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
|
|
18084
18084
|
acs_access_group: {
|
|
18085
18085
|
/** ID of the access group. */
|
|
18086
18086
|
acs_access_group_id: string;
|
|
@@ -19428,7 +19428,7 @@ export type Routes = {
|
|
|
19428
19428
|
acs_system_id?: string | undefined;
|
|
19429
19429
|
/** Access method for the new credential. Supported values: `code`, `card`, `mobile_key`, `cloud_key`. */
|
|
19430
19430
|
access_method: 'code' | 'card' | 'mobile_key' | 'cloud_key';
|
|
19431
|
-
/** Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
19431
|
+
/** Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides). */
|
|
19432
19432
|
code?: string | undefined;
|
|
19433
19433
|
/** Indicates whether the new credential is a [multi-phone sync credential](https://docs.seam.co/latest/capability-guides/mobile-access/issuing-mobile-credentials-from-an-access-control-system#what-are-multi-phone-sync-credentials). */
|
|
19434
19434
|
is_multi_phone_sync_credential?: boolean;
|
|
@@ -22236,7 +22236,7 @@ export type Routes = {
|
|
|
22236
22236
|
|
|
22237
22237
|
See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).
|
|
22238
22238
|
|
|
22239
|
-
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
22239
|
+
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
|
|
22240
22240
|
acs_encoder: {
|
|
22241
22241
|
/** ID of the [encoder](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners. */
|
|
22242
22242
|
acs_encoder_id: string;
|
|
@@ -26061,7 +26061,7 @@ export type Routes = {
|
|
|
26061
26061
|
|
|
26062
26062
|
An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
|
|
26063
26063
|
|
|
26064
|
-
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
26064
|
+
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
|
|
26065
26065
|
acs_user: {
|
|
26066
26066
|
/** ID of the [access system user](https://docs.seam.co/latest/capability-guides/access-systems/user-management). */
|
|
26067
26067
|
acs_user_id: string;
|
|
@@ -26336,7 +26336,7 @@ export type Routes = {
|
|
|
26336
26336
|
|
|
26337
26337
|
An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
|
|
26338
26338
|
|
|
26339
|
-
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
26339
|
+
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
|
|
26340
26340
|
acs_user: {
|
|
26341
26341
|
/** ID of the [access system user](https://docs.seam.co/latest/capability-guides/access-systems/user-management). */
|
|
26342
26342
|
acs_user_id: string;
|
package/package.json
CHANGED
|
@@ -178,7 +178,7 @@ export const acs_access_group = common_acs_access_group.extend({
|
|
|
178
178
|
|
|
179
179
|
Some access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
|
|
180
180
|
|
|
181
|
-
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
181
|
+
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
|
|
182
182
|
`)
|
|
183
183
|
export const unmanaged_acs_access_group = common_acs_access_group.extend({
|
|
184
184
|
is_managed: z.literal(false),
|
|
@@ -91,7 +91,7 @@ export const acs_encoder = z.object({
|
|
|
91
91
|
|
|
92
92
|
See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).
|
|
93
93
|
|
|
94
|
-
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
94
|
+
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
|
|
95
95
|
`)
|
|
96
96
|
|
|
97
97
|
export type AcsEncoder = z.infer<typeof acs_encoder>
|
|
@@ -332,7 +332,7 @@ export const acs_user = common_acs_user.merge(
|
|
|
332
332
|
|
|
333
333
|
An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
|
|
334
334
|
|
|
335
|
-
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
335
|
+
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
|
|
336
336
|
`)
|
|
337
337
|
|
|
338
338
|
export const unmanaged_acs_user = common_acs_user.merge(
|
|
@@ -3066,7 +3066,7 @@ export default {
|
|
|
3066
3066
|
},
|
|
3067
3067
|
acs_access_group: {
|
|
3068
3068
|
description:
|
|
3069
|
-
'Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
3069
|
+
'Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).',
|
|
3070
3070
|
properties: {
|
|
3071
3071
|
access_group_type: {
|
|
3072
3072
|
deprecated: true,
|
|
@@ -4104,7 +4104,7 @@ export default {
|
|
|
4104
4104
|
},
|
|
4105
4105
|
acs_encoder: {
|
|
4106
4106
|
description:
|
|
4107
|
-
'Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
4107
|
+
'Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).',
|
|
4108
4108
|
properties: {
|
|
4109
4109
|
acs_encoder_id: {
|
|
4110
4110
|
description:
|
|
@@ -4971,7 +4971,7 @@ export default {
|
|
|
4971
4971
|
},
|
|
4972
4972
|
acs_user: {
|
|
4973
4973
|
description:
|
|
4974
|
-
'Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
4974
|
+
'Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).',
|
|
4975
4975
|
properties: {
|
|
4976
4976
|
access_schedule: {
|
|
4977
4977
|
description:
|
|
@@ -42773,7 +42773,7 @@ export default {
|
|
|
42773
42773
|
},
|
|
42774
42774
|
code: {
|
|
42775
42775
|
description:
|
|
42776
|
-
'Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
42776
|
+
'Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides).',
|
|
42777
42777
|
pattern: '^\\d+$',
|
|
42778
42778
|
type: 'string',
|
|
42779
42779
|
},
|
|
@@ -20851,7 +20851,7 @@ export type Routes = {
|
|
|
20851
20851
|
|
|
20852
20852
|
Some access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
|
|
20853
20853
|
|
|
20854
|
-
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
20854
|
+
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
|
|
20855
20855
|
acs_access_group: {
|
|
20856
20856
|
/** ID of the access group. */
|
|
20857
20857
|
acs_access_group_id: string
|
|
@@ -22406,7 +22406,7 @@ export type Routes = {
|
|
|
22406
22406
|
acs_system_id?: string | undefined
|
|
22407
22407
|
/** Access method for the new credential. Supported values: `code`, `card`, `mobile_key`, `cloud_key`. */
|
|
22408
22408
|
access_method: 'code' | 'card' | 'mobile_key' | 'cloud_key'
|
|
22409
|
-
/** Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
22409
|
+
/** Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides). */
|
|
22410
22410
|
code?: string | undefined
|
|
22411
22411
|
/** Indicates whether the new credential is a [multi-phone sync credential](https://docs.seam.co/latest/capability-guides/mobile-access/issuing-mobile-credentials-from-an-access-control-system#what-are-multi-phone-sync-credentials). */
|
|
22412
22412
|
is_multi_phone_sync_credential?: boolean
|
|
@@ -25708,7 +25708,7 @@ export type Routes = {
|
|
|
25708
25708
|
|
|
25709
25709
|
See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).
|
|
25710
25710
|
|
|
25711
|
-
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
25711
|
+
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
|
|
25712
25712
|
acs_encoder: {
|
|
25713
25713
|
/** ID of the [encoder](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners. */
|
|
25714
25714
|
acs_encoder_id: string
|
|
@@ -30210,7 +30210,7 @@ export type Routes = {
|
|
|
30210
30210
|
|
|
30211
30211
|
An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
|
|
30212
30212
|
|
|
30213
|
-
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
30213
|
+
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
|
|
30214
30214
|
acs_user: {
|
|
30215
30215
|
/** ID of the [access system user](https://docs.seam.co/latest/capability-guides/access-systems/user-management). */
|
|
30216
30216
|
acs_user_id: string
|
|
@@ -30522,7 +30522,7 @@ export type Routes = {
|
|
|
30522
30522
|
|
|
30523
30523
|
An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
|
|
30524
30524
|
|
|
30525
|
-
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
30525
|
+
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
|
|
30526
30526
|
acs_user: {
|
|
30527
30527
|
/** ID of the [access system user](https://docs.seam.co/latest/capability-guides/access-systems/user-management). */
|
|
30528
30528
|
acs_user_id: string
|