Coverage for fingerprint_pro_server_api_sdk/models/webhook_tampering.py: 57%

37 statements  

« prev     ^ index     » next       coverage.py v7.8.0, created at 2025-04-25 12:47 +0000

1# coding: utf-8 

2 

3""" 

4 Fingerprint Pro Server API 

5 

6 Fingerprint Pro Server API allows you to get information about visitors and about individual events in a server environment. It can be used for data exports, decision-making, and data analysis scenarios. Server API is intended for server-side usage, it's not intended to be used from the client side, whether it's a browser or a mobile device. # noqa: E501 

7 

8 OpenAPI spec version: 3 

9 Contact: support@fingerprint.com 

10 Generated by: https://github.com/swagger-api/swagger-codegen.git 

11""" 

12 

13import re # noqa: F401 

14from typing import Dict, List, Optional # noqa: F401 

15from fingerprint_pro_server_api_sdk.base_model import BaseModel 

16 

17 

18class WebhookTampering(BaseModel): 

19 """NOTE: This class is auto generated by the swagger code generator program. 

20 

21 Do not edit the class manually. 

22 """ 

23 """ 

24 Attributes: 

25 swagger_types (dict): The key is attribute name 

26 and the value is attribute type. 

27 attribute_map (dict): The key is attribute name 

28 and the value is json key in definition. 

29 """ 

30 swagger_types = { 

31 'result': 'bool', 

32 'anomaly_score': 'float', 

33 'anti_detect_browser': 'bool' 

34 } 

35 

36 nullable_map = { 

37 'result': False, 

38 'anomaly_score': False, 

39 'anti_detect_browser': False 

40 } 

41 

42 attribute_map = { 

43 'result': 'result', 

44 'anomaly_score': 'anomalyScore', 

45 'anti_detect_browser': 'antiDetectBrowser' 

46 } 

47 

48 def __init__(self, result=None, anomaly_score=None, anti_detect_browser=None): # noqa: E501 

49 """WebhookTampering - a model defined in Swagger""" # noqa: E501 

50 self._result = None 

51 self._anomaly_score = None 

52 self._anti_detect_browser = None 

53 self.discriminator = None 

54 if result is not None: 

55 self.result = result 

56 if anomaly_score is not None: 

57 self.anomaly_score = anomaly_score 

58 if anti_detect_browser is not None: 

59 self.anti_detect_browser = anti_detect_browser 

60 

61 @property 

62 def result(self) -> Optional[bool]: 

63 """Gets the result of this WebhookTampering. # noqa: E501 

64 

65 Indicates if an identification request from a browser or an Android SDK has been tampered with. Not supported in the iOS SDK, is always `false` for iOS requests. * `true` - If the request meets either of the following conditions: * Contains anomalous browser or device attributes that could not have been legitimately produced by the JavaScript agent or the Android SDK (see `anomalyScore`). * Originated from an anti-detect browser like Incognition (see `antiDetectBrowser`). * `false` - If the request is considered genuine or was generated by the iOS SDK. # noqa: E501 

66 

67 :return: The result of this WebhookTampering. # noqa: E501 

68 """ 

69 return self._result 

70 

71 @result.setter 

72 def result(self, result: Optional[bool]): 

73 """Sets the result of this WebhookTampering. 

74 

75 Indicates if an identification request from a browser or an Android SDK has been tampered with. Not supported in the iOS SDK, is always `false` for iOS requests. * `true` - If the request meets either of the following conditions: * Contains anomalous browser or device attributes that could not have been legitimately produced by the JavaScript agent or the Android SDK (see `anomalyScore`). * Originated from an anti-detect browser like Incognition (see `antiDetectBrowser`). * `false` - If the request is considered genuine or was generated by the iOS SDK. # noqa: E501 

76 

77 :param result: The result of this WebhookTampering. # noqa: E501 

78 """ 

79 

80 self._result = result 

81 

82 @property 

83 def anomaly_score(self) -> Optional[float]: 

84 """Gets the anomaly_score of this WebhookTampering. # noqa: E501 

85 

86 A score that indicates the extent of anomalous data in the request. This field applies to requests originating from **both** browsers and Android SDKs. * Values above `0.5` indicate that the request has been tampered with. * Values below `0.5` indicate that the request is genuine. # noqa: E501 

87 

88 :return: The anomaly_score of this WebhookTampering. # noqa: E501 

89 """ 

90 return self._anomaly_score 

91 

92 @anomaly_score.setter 

93 def anomaly_score(self, anomaly_score: Optional[float]): 

94 """Sets the anomaly_score of this WebhookTampering. 

95 

96 A score that indicates the extent of anomalous data in the request. This field applies to requests originating from **both** browsers and Android SDKs. * Values above `0.5` indicate that the request has been tampered with. * Values below `0.5` indicate that the request is genuine. # noqa: E501 

97 

98 :param anomaly_score: The anomaly_score of this WebhookTampering. # noqa: E501 

99 """ 

100 

101 self._anomaly_score = anomaly_score 

102 

103 @property 

104 def anti_detect_browser(self) -> Optional[bool]: 

105 """Gets the anti_detect_browser of this WebhookTampering. # noqa: E501 

106 

107 Anti-detect browsers try to evade identification by masking or manipulating their fingerprint to imitate legitimate browser configurations. This field does not apply to requests originating from mobile SDKs. * `true` - The browser resembles a known anti-detect browser, for example, Incognition. * `false` - The browser does not resemble an anti-detect browser or the request originates from a mobile SDK. # noqa: E501 

108 

109 :return: The anti_detect_browser of this WebhookTampering. # noqa: E501 

110 """ 

111 return self._anti_detect_browser 

112 

113 @anti_detect_browser.setter 

114 def anti_detect_browser(self, anti_detect_browser: Optional[bool]): 

115 """Sets the anti_detect_browser of this WebhookTampering. 

116 

117 Anti-detect browsers try to evade identification by masking or manipulating their fingerprint to imitate legitimate browser configurations. This field does not apply to requests originating from mobile SDKs. * `true` - The browser resembles a known anti-detect browser, for example, Incognition. * `false` - The browser does not resemble an anti-detect browser or the request originates from a mobile SDK. # noqa: E501 

118 

119 :param anti_detect_browser: The anti_detect_browser of this WebhookTampering. # noqa: E501 

120 """ 

121 

122 self._anti_detect_browser = anti_detect_browser 

123