Coverage for fingerprint_pro_server_api_sdk/models/tampering.py: 92%

40 statements  

« prev     ^ index     » next       coverage.py v7.6.12, created at 2025-02-21 15:03 +0000

1# coding: utf-8 

2 

3""" 

4 Fingerprint Pro Server API 

5 

6 Fingerprint Pro Server API allows you to get information about visitors and about individual events in a server environment. It can be used for data exports, decision-making, and data analysis scenarios. Server API is intended for server-side usage, it's not intended to be used from the client side, whether it's a browser or a mobile device. # noqa: E501 

7 

8 OpenAPI spec version: 3 

9 Contact: support@fingerprint.com 

10 Generated by: https://github.com/swagger-api/swagger-codegen.git 

11""" 

12 

13import re # noqa: F401 

14from typing import Dict, List, Optional # noqa: F401 

15from fingerprint_pro_server_api_sdk.base_model import BaseModel 

16 

17 

18class Tampering(BaseModel): 

19 """NOTE: This class is auto generated by the swagger code generator program. 

20 

21 Do not edit the class manually. 

22 """ 

23 """ 

24 Attributes: 

25 swagger_types (dict): The key is attribute name 

26 and the value is attribute type. 

27 attribute_map (dict): The key is attribute name 

28 and the value is json key in definition. 

29 """ 

30 swagger_types = { 

31 'result': 'bool', 

32 'anomaly_score': 'float', 

33 'anti_detect_browser': 'bool' 

34 } 

35 

36 nullable_map = { 

37 'result': False, 

38 'anomaly_score': False, 

39 'anti_detect_browser': False 

40 } 

41 

42 attribute_map = { 

43 'result': 'result', 

44 'anomaly_score': 'anomalyScore', 

45 'anti_detect_browser': 'antiDetectBrowser' 

46 } 

47 

48 def __init__(self, result=None, anomaly_score=None, anti_detect_browser=None): # noqa: E501 

49 """Tampering - a model defined in Swagger""" # noqa: E501 

50 self._result = None 

51 self._anomaly_score = None 

52 self._anti_detect_browser = None 

53 self.discriminator = None 

54 self.result = result 

55 self.anomaly_score = anomaly_score 

56 self.anti_detect_browser = anti_detect_browser 

57 

58 @property 

59 def result(self) -> bool: 

60 """Gets the result of this Tampering. # noqa: E501 

61 

62 Flag indicating browser tampering was detected. This happens when either of these conditions is true: * There are inconsistencies in the browser configuration that cross our internal tampering thresholds (indicated by `anomalyScore`). * The browser signature resembles one of \"anti-detect\" browsers specifically designed to evade identification and fingerprinting, for example, Incognition (indicated by `antiDetectBrowser`). # noqa: E501 

63 

64 :return: The result of this Tampering. # noqa: E501 

65 """ 

66 return self._result 

67 

68 @result.setter 

69 def result(self, result: bool): 

70 """Sets the result of this Tampering. 

71 

72 Flag indicating browser tampering was detected. This happens when either of these conditions is true: * There are inconsistencies in the browser configuration that cross our internal tampering thresholds (indicated by `anomalyScore`). * The browser signature resembles one of \"anti-detect\" browsers specifically designed to evade identification and fingerprinting, for example, Incognition (indicated by `antiDetectBrowser`). # noqa: E501 

73 

74 :param result: The result of this Tampering. # noqa: E501 

75 """ 

76 if result is None: 

77 raise ValueError("Invalid value for `result`, must not be `None`") # noqa: E501 

78 

79 self._result = result 

80 

81 @property 

82 def anomaly_score(self) -> float: 

83 """Gets the anomaly_score of this Tampering. # noqa: E501 

84 

85 Confidence score (`0.0 - 1.0`) for tampering detection: * Values above `0.5` indicate that there was a tampering attempt. * Values below `0.5` indicate genuine browsers. # noqa: E501 

86 

87 :return: The anomaly_score of this Tampering. # noqa: E501 

88 """ 

89 return self._anomaly_score 

90 

91 @anomaly_score.setter 

92 def anomaly_score(self, anomaly_score: float): 

93 """Sets the anomaly_score of this Tampering. 

94 

95 Confidence score (`0.0 - 1.0`) for tampering detection: * Values above `0.5` indicate that there was a tampering attempt. * Values below `0.5` indicate genuine browsers. # noqa: E501 

96 

97 :param anomaly_score: The anomaly_score of this Tampering. # noqa: E501 

98 """ 

99 if anomaly_score is None: 

100 raise ValueError("Invalid value for `anomaly_score`, must not be `None`") # noqa: E501 

101 

102 self._anomaly_score = anomaly_score 

103 

104 @property 

105 def anti_detect_browser(self) -> bool: 

106 """Gets the anti_detect_browser of this Tampering. # noqa: E501 

107 

108 Is `true` if the identified browser resembles one of \"anti-detect\" browsers, for example, Incognition. Anti-detect browsers try to evade identification by masking or manipulating their fingerprint to imitate legitimate browser configurations. # noqa: E501 

109 

110 :return: The anti_detect_browser of this Tampering. # noqa: E501 

111 """ 

112 return self._anti_detect_browser 

113 

114 @anti_detect_browser.setter 

115 def anti_detect_browser(self, anti_detect_browser: bool): 

116 """Sets the anti_detect_browser of this Tampering. 

117 

118 Is `true` if the identified browser resembles one of \"anti-detect\" browsers, for example, Incognition. Anti-detect browsers try to evade identification by masking or manipulating their fingerprint to imitate legitimate browser configurations. # noqa: E501 

119 

120 :param anti_detect_browser: The anti_detect_browser of this Tampering. # noqa: E501 

121 """ 

122 if anti_detect_browser is None: 

123 raise ValueError("Invalid value for `anti_detect_browser`, must not be `None`") # noqa: E501 

124 

125 self._anti_detect_browser = anti_detect_browser 

126