@fingerprint/node-sdk 7.0.0-test.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,1517 @@
1
+ export interface paths {
2
+ '/events/{event_id}': {
3
+ parameters: {
4
+ query?: never
5
+ header?: never
6
+ path?: never
7
+ cookie?: never
8
+ }
9
+ /**
10
+ * Get an event by event ID
11
+ * @description Get a detailed analysis of an individual identification event, including Smart Signals.
12
+ *
13
+ * Use `event_id` as the URL path parameter. This API method is scoped to a request, i.e. all returned information is by `event_id`.
14
+ *
15
+ */
16
+ get: operations['getEvent']
17
+ put?: never
18
+ post?: never
19
+ delete?: never
20
+ options?: never
21
+ head?: never
22
+ /**
23
+ * Update an event
24
+ * @description Change information in existing events specified by `event_id` or *flag suspicious events*.
25
+ *
26
+ * When an event is created, it can be assigned `linked_id` and `tags` submitted through the JS agent parameters.
27
+ * This information might not have been available on the client initially, so the Server API permits updating these attributes after the fact.
28
+ *
29
+ * **Warning** It's not possible to update events older than one month.
30
+ *
31
+ * **Warning** Trying to update an event immediately after creation may temporarily result in an
32
+ * error (HTTP 409 Conflict. The event is not mutable yet.) as the event is fully propagated across our systems. In such a case, simply retry the request.
33
+ *
34
+ */
35
+ patch: operations['updateEvent']
36
+ trace?: never
37
+ }
38
+ '/events': {
39
+ parameters: {
40
+ query?: never
41
+ header?: never
42
+ path?: never
43
+ cookie?: never
44
+ }
45
+ /**
46
+ * Search events
47
+ * @description ## Search
48
+ *
49
+ * The `/v4/events` endpoint provides a convenient way to search for past events based on specific parameters. Typical use cases and queries include:
50
+ *
51
+ * - Searching for events associated with a single `visitor_id` within a time range to get historical behavior of a visitor.
52
+ * - Searching for events associated with a single `linked_id` within a time range to get all events associated with your internal account identifier.
53
+ * - Excluding all bot traffic from the query (`good` and `bad` bots)
54
+ *
55
+ * If you don't provide `start` or `end` parameters, the default search range is the **last 7 days**.
56
+ *
57
+ * ### Filtering events with the `suspect` flag
58
+ *
59
+ * The `/v4/events` endpoint unlocks a powerful method for fraud protection analytics. The `suspect` flag is exposed in all events where it was previously set by the update API.
60
+ *
61
+ * You can also apply the `suspect` query parameter as a filter to find all potentially fraudulent activity that you previously marked as `suspect`. This helps identify patterns of fraudulent behavior.
62
+ *
63
+ * ### Environment scoping
64
+ *
65
+ * If you use a secret key that is scoped to an environment, you will only get events associated with the same environment. With a workspace-scoped environment, you will get events from all environments.
66
+ *
67
+ * Smart Signals not activated for your workspace or are not included in the response.
68
+ *
69
+ */
70
+ get: operations['searchEvents']
71
+ put?: never
72
+ post?: never
73
+ delete?: never
74
+ options?: never
75
+ head?: never
76
+ patch?: never
77
+ trace?: never
78
+ }
79
+ '/visitors/{visitor_id}': {
80
+ parameters: {
81
+ query?: never
82
+ header?: never
83
+ path?: never
84
+ cookie?: never
85
+ }
86
+ get?: never
87
+ put?: never
88
+ post?: never
89
+ /**
90
+ * Delete data by visitor ID
91
+ * @description Request deleting all data associated with the specified visitor ID. This API is useful for compliance with privacy regulations.
92
+ *
93
+ * ### Which data is deleted?
94
+ * - Browser (or device) properties
95
+ * - Identification requests made from this browser (or device)
96
+ *
97
+ * #### Browser (or device) properties
98
+ * - Represents the data that Fingerprint collected from this specific browser (or device) and everything inferred and derived from it.
99
+ * - Upon request to delete, this data is deleted asynchronously (typically within a few minutes) and it will no longer be used to identify this browser (or device) for your [Fingerprint Workspace](https://docs.fingerprint.com/docs/glossary#fingerprint-workspace).
100
+ *
101
+ * #### Identification requests made from this browser (or device)
102
+ * - Fingerprint stores the identification requests made from a browser (or device) for up to 30 (or 90) days depending on your plan. To learn more, see [Data Retention](https://docs.fingerprint.com/docs/regions#data-retention).
103
+ * - Upon request to delete, the identification requests that were made by this browser
104
+ * - Within the past 10 days are deleted within 24 hrs.
105
+ * - Outside of 10 days are allowed to purge as per your data retention period.
106
+ *
107
+ * ### Corollary
108
+ * After requesting to delete a visitor ID,
109
+ * - If the same browser (or device) requests to identify, it will receive a different visitor ID.
110
+ * - If you request [`/v4/events` API](https://docs.fingerprint.com/reference/server-api-v4-get-event) with an `event_id` that was made outside of the 10 days, you will still receive a valid response.
111
+ *
112
+ * ### Interested?
113
+ * Please [contact our support team](https://fingerprint.com/support/) to enable it for you. Otherwise, you will receive a 403.
114
+ *
115
+ */
116
+ delete: operations['deleteVisitorData']
117
+ options?: never
118
+ head?: never
119
+ patch?: never
120
+ trace?: never
121
+ }
122
+ }
123
+ export type webhooks = Record<string, never>
124
+ export interface components {
125
+ schemas: {
126
+ /** @description Unique identifier of the user's request. The first portion of the event_id is a unix epoch milliseconds timestamp For example: `1758130560902.8tRtrH`
127
+ * */
128
+ EventId: string
129
+ /**
130
+ * Format: int64
131
+ * @description Timestamp of the event with millisecond precision in Unix time.
132
+ */
133
+ Timestamp: number
134
+ /** @description A customer-provided id that was sent with the request. */
135
+ LinkedId: string
136
+ /** @description Environment Id of the event. For example: `ae_47abaca3db2c7c43`
137
+ * */
138
+ EnvironmentId: string
139
+ /** @description Field is `true` if you have previously set the `suspect` flag for this event using the [Server API Update event endpoint](https://docs.fingerprint.com/reference/server-api-v4-update-event). */
140
+ Suspect: boolean
141
+ Integration: {
142
+ /** @description The name of the specific integration, e.g. "fingerprint-pro-react". */
143
+ name?: string
144
+ /** @description The version of the specific integration, e.g. "3.11.10". */
145
+ version?: string
146
+ subintegration?: {
147
+ /** @description The name of the specific subintegration, e.g. "preact". */
148
+ name?: string
149
+ /** @description The version of the specific subintegration, e.g. "10.21.0". */
150
+ version?: string
151
+ }
152
+ }
153
+ /** @description Contains information about the SDK used to perform the request. */
154
+ SDK: {
155
+ /**
156
+ * @description Platform of the SDK used for the identification request.
157
+ * @enum {string}
158
+ */
159
+ platform: 'js' | 'android' | 'ios' | 'unknown'
160
+ /** @description Version string of the SDK used for the identification request. For example: `"3.12.1"`
161
+ * */
162
+ version: string
163
+ integrations?: components['schemas']['Integration'][]
164
+ }
165
+ /** @description `true` if we determined that this payload was replayed, `false` otherwise.
166
+ * */
167
+ Replayed: boolean
168
+ IdentificationConfidence: {
169
+ /**
170
+ * Format: double
171
+ * @description The confidence score is a floating-point number between 0 and 1 that represents the probability of accurate identification.
172
+ */
173
+ score: number
174
+ /** @description The version name of the method used to calculate the Confidence score. This field is only present for customers who opted in to an alternative calculation method. */
175
+ version?: string
176
+ comment?: string
177
+ }
178
+ Identification: {
179
+ /** @description String of 20 characters that uniquely identifies the visitor's browser or mobile device. */
180
+ visitor_id: string
181
+ confidence?: components['schemas']['IdentificationConfidence']
182
+ /** @description Attribute represents if a visitor had been identified before. */
183
+ visitor_found: boolean
184
+ /**
185
+ * Format: int64
186
+ * @description Unix epoch time milliseconds timestamp indicating the time at which this visitor ID was first seen. example: `1758069706642` - Corresponding to Wed Sep 17 2025 00:41:46 GMT+0000
187
+ *
188
+ */
189
+ first_seen_at?: number
190
+ /**
191
+ * Format: int64
192
+ * @description Unix epoch time milliseconds timestamp indicating the time at which this visitor ID was last seen. example: `1758069706642` - Corresponding to Wed Sep 17 2025 00:41:46 GMT+0000
193
+ *
194
+ */
195
+ last_seen_at?: number
196
+ }
197
+ /** @description A supplementary browser identifier that prioritizes coverage over precision. The High Recall ID algorithm matches more generously, i.e., this identifier will remain the same even when there are subtle differences between two requests. This algorithm does not create as many new visitor IDs as the standard algorithms do, but there could be an increase in false-positive identification. */
198
+ SupplementaryIDHighRecall: {
199
+ /** @description String of 20 characters that uniquely identifies the visitor's browser or mobile device. */
200
+ visitor_id: string
201
+ /** @description Attribute represents if a visitor had been identified before. */
202
+ visitor_found: boolean
203
+ confidence?: components['schemas']['IdentificationConfidence']
204
+ /**
205
+ * Format: int64
206
+ * @description Unix epoch time milliseconds timestamp indicating the time at which this ID was first seen. example: `1758069706642` - Corresponding to Wed Sep 17 2025 00:41:46 GMT+0000
207
+ *
208
+ */
209
+ first_seen_at?: number
210
+ /**
211
+ * Format: int64
212
+ * @description Unix epoch time milliseconds timestamp indicating the time at which this ID was last seen. example: `1758069706642` - Corresponding to Wed Sep 17 2025 00:41:46 GMT+0000
213
+ *
214
+ */
215
+ last_seen_at?: number
216
+ }
217
+ /** @description A customer-provided value or an object that was sent with the identification request or updated later. */
218
+ Tags: {
219
+ [key: string]: unknown
220
+ }
221
+ /** @description Page URL from which the request was sent. For example `https://example.com/`
222
+ * */
223
+ Url: string
224
+ /** @description Bundle Id of the iOS application integrated with the Fingerprint SDK for the event. For example: `com.foo.app`
225
+ * */
226
+ BundleId: string
227
+ /** @description Package name of the Android application integrated with the Fingerprint SDK for the event. For example: `com.foo.app`
228
+ * */
229
+ PackageName: string
230
+ /** @description IP address of the requesting browser or bot. */
231
+ IpAddress: string
232
+ /** @description User Agent of the client, for example: `Mozilla/5.0 (Windows NT 6.1; Win64; x64) ....`
233
+ * */
234
+ UserAgent: string
235
+ /** @description Client Referrer field corresponds to the `document.referrer` field gathered during an identification request. The value is an empty string if the user navigated to the page directly (not through a link, but, for example, by using a bookmark) For example: `https://example.com/blog/my-article`
236
+ * */
237
+ ClientReferrer: string
238
+ BrowserDetails: {
239
+ browser_name: string
240
+ browser_major_version: string
241
+ browser_full_version: string
242
+ os: string
243
+ os_version: string
244
+ device: string
245
+ }
246
+ /** @description Proximity ID represents a fixed geographical zone in a discrete global grid within which the device is observed.
247
+ * */
248
+ Proximity: {
249
+ /** @description A stable privacy-preserving identifier for a given proximity zone.
250
+ * */
251
+ id: string
252
+ /**
253
+ * Format: int32
254
+ * @description The radius of the proximity zone’s precision level, in meters.
255
+ *
256
+ * @enum {integer}
257
+ */
258
+ precision_radius: 10 | 25 | 65 | 175 | 450 | 1200 | 3300 | 8500 | 22500
259
+ /**
260
+ * Format: float
261
+ * @description A value between `0` and `1` representing the likelihood that the true device location lies within the mapped proximity zone.
262
+ * * Scores closer to `1` indicate high confidence that the location is inside the mapped proximity zone.
263
+ * * Scores closer to `0` indicate lower confidence, suggesting the true location may fall in an adjacent zone.
264
+ *
265
+ */
266
+ confidence: number
267
+ }
268
+ /**
269
+ * @description Bot detection result:
270
+ * * `bad` - bad bot detected, such as Selenium, Puppeteer, Playwright, headless browsers, and so on
271
+ * * `good` - good bot detected, such as Google bot, Baidu Spider, AlexaBot and so on
272
+ * * `not_detected` - the visitor is not a bot
273
+ *
274
+ * @enum {string}
275
+ */
276
+ BotResult: 'bad' | 'good' | 'not_detected'
277
+ /** @description Additional classification of the bot type if detected.
278
+ * */
279
+ BotType: string
280
+ /** @description Extended bot information. */
281
+ BotInfo: {
282
+ /** @description The type and purpose of the bot. */
283
+ category: string
284
+ /** @description The organization or company operating the bot. */
285
+ provider: string
286
+ /** @description The URL of the bot provider's website. */
287
+ provider_url?: string
288
+ /** @description The specific name or identifier of the bot. */
289
+ name: string
290
+ /**
291
+ * @description The verification status of the bot's identity:
292
+ * * `verified` - well-known bot with publicly verifiable identity, directed by the bot provider.
293
+ * * `signed` - bot that signs its platform via Web Bot Auth, directed by the bot provider’s customers.
294
+ * * `spoofed` - bot that claims a public identity but fails verification.
295
+ * * `unknown` - bot that does not publish a verifiable identity.
296
+ *
297
+ * @enum {string}
298
+ */
299
+ identity: 'verified' | 'signed' | 'spoofed' | 'unknown'
300
+ /**
301
+ * @description Confidence level of the bot identification.
302
+ * @enum {string}
303
+ */
304
+ confidence: 'low' | 'medium' | 'high'
305
+ }
306
+ /** @description Android specific cloned application detection. There are 2 values: * `true` - Presence of app cloners work detected (e.g. fully cloned application found or launch of it inside of a not main working profile detected). * `false` - No signs of cloned application detected or the client is not Android.
307
+ * */
308
+ ClonedApp: boolean
309
+ /** @description `true` if the browser is Chrome with DevTools open or Firefox with Developer Tools open, `false` otherwise.
310
+ * */
311
+ DeveloperTools: boolean
312
+ /** @description Android specific emulator detection. There are 2 values:
313
+ * * `true` - Emulated environment detected (e.g. launch inside of AVD).
314
+ * * `false` - No signs of emulated environment detected or the client is not Android.
315
+ * */
316
+ Emulator: boolean
317
+ /**
318
+ * Format: int64
319
+ * @description The time of the most recent factory reset that happened on the **mobile device** is expressed as Unix epoch time. When a factory reset cannot be detected on the mobile device or when the request is initiated from a browser, this field will correspond to the *epoch* time (i.e 1 Jan 1970 UTC) as a value of 0. See [Factory Reset Detection](https://docs.fingerprint.com/docs/smart-signals-reference#factory-reset-detection) to learn more about this Smart Signal.
320
+ *
321
+ */
322
+ FactoryReset: number
323
+ /** @description [Frida](https://frida.re/docs/) detection for Android and iOS devices. There are 2 values:
324
+ * * `true` - Frida detected
325
+ * * `false` - No signs of Frida or the client is not a mobile device.
326
+ * */
327
+ Frida: boolean
328
+ IPBlockList: {
329
+ /** @description IP address was part of a known email spam attack (SMTP). */
330
+ email_spam?: boolean
331
+ /** @description IP address was part of a known network attack (SSH/HTTPS). */
332
+ attack_source?: boolean
333
+ /** @description IP address was part of known TOR network activity. */
334
+ tor_node?: boolean
335
+ }
336
+ Geolocation: {
337
+ /** @description The IP address is likely to be within this radius (in km) of the specified location. */
338
+ accuracy_radius?: number
339
+ /** Format: double */
340
+ latitude?: number
341
+ /** Format: double */
342
+ longitude?: number
343
+ postal_code?: string
344
+ /** Format: timezone */
345
+ timezone?: string
346
+ city_name?: string
347
+ country_code?: string
348
+ country_name?: string
349
+ continent_code?: string
350
+ continent_name?: string
351
+ subdivisions?: {
352
+ iso_code: string
353
+ name: string
354
+ }[]
355
+ }
356
+ IPInfoV4: {
357
+ /** Format: ipv4 */
358
+ address: string
359
+ geolocation?: components['schemas']['Geolocation']
360
+ asn?: string
361
+ asn_name?: string
362
+ asn_network?: string
363
+ asn_type?: string
364
+ datacenter_result?: boolean
365
+ datacenter_name?: string
366
+ }
367
+ IPInfoV6: {
368
+ /** Format: ipv6 */
369
+ address: string
370
+ geolocation?: components['schemas']['Geolocation']
371
+ asn?: string
372
+ asn_name?: string
373
+ asn_network?: string
374
+ asn_type?: string
375
+ datacenter_result?: boolean
376
+ datacenter_name?: string
377
+ }
378
+ /** @description Details about the request IP address. Has separate fields for v4 and v6 IP address versions. */
379
+ IPInfo: {
380
+ v4?: components['schemas']['IPInfoV4']
381
+ v6?: components['schemas']['IPInfoV6']
382
+ }
383
+ /** @description IP address was used by a public proxy provider or belonged to a known recent residential proxy
384
+ * */
385
+ Proxy: boolean
386
+ /**
387
+ * @description Confidence level of the proxy detection. If a proxy is not detected, confidence is "high". If it's detected, can be "low", "medium", or "high".
388
+ *
389
+ * @enum {string}
390
+ */
391
+ ProxyConfidence: 'low' | 'medium' | 'high'
392
+ /** @description Proxy detection details (present if `proxy` is `true`) */
393
+ ProxyDetails: {
394
+ /**
395
+ * @description Residential proxies use real user IP addresses to appear as legitimate traffic,
396
+ * while data center proxies are public proxies hosted in data centers
397
+ *
398
+ * @enum {string}
399
+ */
400
+ proxy_type: 'residential' | 'data_center'
401
+ /**
402
+ * Format: int64
403
+ * @description Unix millisecond timestamp with hourly resolution of when this IP was last seen as a proxy
404
+ *
405
+ */
406
+ last_seen_at?: number
407
+ /** @description String representing the last proxy service provider detected when this
408
+ * IP was synced. An IP can be shared by multiple service providers.
409
+ * */
410
+ provider?: string
411
+ }
412
+ /** @description `true` if we detected incognito mode used in the browser, `false` otherwise.
413
+ * */
414
+ Incognito: boolean
415
+ /** @description iOS specific jailbreak detection. There are 2 values:
416
+ * * `true` - Jailbreak detected.
417
+ * * `false` - No signs of jailbreak or the client is not iOS.
418
+ * */
419
+ Jailbroken: boolean
420
+ /** @description Flag indicating whether the request came from a mobile device with location spoofing enabled. */
421
+ LocationSpoofing: boolean
422
+ /** @description * `true` - When requests made from your users' mobile devices to Fingerprint servers have been intercepted and potentially modified.
423
+ * * `false` - Otherwise or when the request originated from a browser.
424
+ * See [MitM Attack Detection](https://docs.fingerprint.com/docs/smart-signals-reference#mitm-attack-detection) to learn more about this Smart Signal.
425
+ * */
426
+ MitMAttack: boolean
427
+ /** @description `true` if the request is from a privacy aware browser (e.g. Tor) or from a browser in which fingerprinting is blocked. Otherwise `false`.
428
+ * */
429
+ PrivacySettings: boolean
430
+ /** @description Android specific root management apps detection. There are 2 values:
431
+ * * `true` - Root Management Apps detected (e.g. Magisk).
432
+ * * `false` - No Root Management Apps detected or the client isn't Android.
433
+ * */
434
+ RootApps: boolean
435
+ /** @description The ID of the evaluated ruleset. */
436
+ RulesetId: string
437
+ /** @description The ID of the rule that matched the identification event. */
438
+ RuleId: string
439
+ /** @description The expression of the rule that matched the identification event. */
440
+ RuleExpression: string
441
+ /**
442
+ * @description Describes the action to take with the request.
443
+ * @enum {string}
444
+ */
445
+ RuleActionType: 'allow' | 'block'
446
+ RuleActionHeaderField: {
447
+ /** @description The header field name. */
448
+ name: string
449
+ /** @description The value of the header field. */
450
+ value: string
451
+ }
452
+ /** @description The set of header modifications to apply, in the following order: remove, set, append. */
453
+ RequestHeaderModifications: {
454
+ /** @description The list of headers to remove. */
455
+ remove?: string[]
456
+ /** @description The list of headers to set, overwriting any existing headers with the same name. */
457
+ set?: components['schemas']['RuleActionHeaderField'][]
458
+ /** @description The list of headers to append. */
459
+ append?: components['schemas']['RuleActionHeaderField'][]
460
+ }
461
+ /** @description Informs the client that the request should be forwarded to the origin with optional request header modifications. */
462
+ EventRuleActionAllow: {
463
+ /** @description The ID of the evaluated ruleset. */
464
+ ruleset_id: components['schemas']['RulesetId']
465
+ /** @description The ID of the rule that matched the identification event. */
466
+ rule_id?: components['schemas']['RuleId']
467
+ /** @description The expression of the rule that matched the identification event. */
468
+ rule_expression?: components['schemas']['RuleExpression']
469
+ /**
470
+ * @description discriminator enum property added by openapi-typescript
471
+ * @enum {string}
472
+ */
473
+ type: 'allow'
474
+ /** @description The set of header modifications to apply, in the following order: remove, set, append. */
475
+ request_header_modifications?: components['schemas']['RequestHeaderModifications']
476
+ }
477
+ /** @description A valid HTTP status code. */
478
+ StatusCode: number
479
+ /** @description The response body to send to the client. */
480
+ RuleActionBody: string
481
+ /** @description Informs the client the request should be blocked using the response described by this rule action. */
482
+ EventRuleActionBlock: {
483
+ /** @description The ID of the evaluated ruleset. */
484
+ ruleset_id: components['schemas']['RulesetId']
485
+ /** @description The ID of the rule that matched the identification event. */
486
+ rule_id?: components['schemas']['RuleId']
487
+ /** @description The expression of the rule that matched the identification event. */
488
+ rule_expression?: components['schemas']['RuleExpression']
489
+ /**
490
+ * @description discriminator enum property added by openapi-typescript
491
+ * @enum {string}
492
+ */
493
+ type: 'block'
494
+ /** @description A valid HTTP status code. */
495
+ status_code?: components['schemas']['StatusCode']
496
+ /** @description A list of headers to send. */
497
+ headers?: components['schemas']['RuleActionHeaderField'][]
498
+ /** @description The response body to send to the client. */
499
+ body?: components['schemas']['RuleActionBody']
500
+ }
501
+ /** @description Describes the action the client should take, according to the rule in the ruleset that matched the event. When getting an event by event ID, the rule_action will only be included when the ruleset_id query parameter is specified. */
502
+ EventRuleAction: components['schemas']['EventRuleActionAllow'] | components['schemas']['EventRuleActionBlock']
503
+ /** @description Suspect Score is an easy way to integrate Smart Signals into your fraud protection work flow. It is a weighted representation of all Smart Signals present in the payload that helps identify suspicious activity. The value range is [0; S] where S is sum of all Smart Signals weights. See more details here: https://docs.fingerprint.com/docs/suspect-score
504
+ * */
505
+ SuspectScore: number
506
+ /** @description Flag indicating browser tampering was detected. This happens when either:
507
+ * * There are inconsistencies in the browser configuration that cross internal tampering thresholds (see `tampering_details.anomaly_score`).
508
+ * * The browser signature resembles an "anti-detect" browser specifically designed to evade fingerprinting (see `tampering_details.anti_detect_browser`).
509
+ * */
510
+ Tampering: boolean
511
+ TamperingDetails: {
512
+ /**
513
+ * Format: double
514
+ * @description Confidence score (`0.0 - 1.0`) for tampering detection:
515
+ * * Values above `0.5` indicate tampering.
516
+ * * Values below `0.5` indicate genuine browsers.
517
+ *
518
+ */
519
+ anomaly_score?: number
520
+ /** @description True if the identified browser resembles an "anti-detect" browser, such as Incognition, which attempts to evade identification by manipulating its fingerprint.
521
+ * */
522
+ anti_detect_browser?: boolean
523
+ }
524
+ /** @description Is absent if the velocity data could not be generated for the visitor Id.
525
+ * */
526
+ VelocityData: {
527
+ /** @description Count for the last 5 minutes of velocity data, from the time of the event.
528
+ * */
529
+ '5_minutes': number
530
+ /** @description Count for the last 1 hour of velocity data, from the time of the event.
531
+ * */
532
+ '1_hour': number
533
+ /** @description The `24_hours` interval of `distinct_ip`, `distinct_linked_id`, `distinct_country`, `distinct_ip_by_linked_id` and `distinct_visitor_id_by_linked_id` will be omitted if the number of `events` for the visitor Id in the last 24 hours (`events.['24_hours']`) is higher than 20.000.
534
+ * */
535
+ '24_hours'?: number
536
+ }
537
+ /** @description Sums key data points for a specific `visitor_id`, `ip_address` and `linked_id` at three distinct time
538
+ * intervals: 5 minutes, 1 hour, and 24 hours as follows:
539
+ *
540
+ * - Number of distinct IP addresses associated to the visitor Id.
541
+ * - Number of distinct linked Ids associated with the visitor Id.
542
+ * - Number of distinct countries associated with the visitor Id.
543
+ * - Number of identification events associated with the visitor Id.
544
+ * - Number of identification events associated with the detected IP address.
545
+ * - Number of distinct IP addresses associated with the provided linked Id.
546
+ * - Number of distinct visitor Ids associated with the provided linked Id.
547
+ *
548
+ * The `24h` interval of `distinct_ip`, `distinct_linked_id`, `distinct_country`,
549
+ * `distinct_ip_by_linked_id` and `distinct_visitor_id_by_linked_id` will be omitted
550
+ * if the number of `events` for the visitor Id in the last 24
551
+ * hours (`events.['24h']`) is higher than 20.000.
552
+ *
553
+ * All will not necessarily be returned in a response, some may be omitted if the
554
+ * associated event does not have the required data, such as a linked_id.
555
+ * */
556
+ Velocity: {
557
+ /** @description Is absent if the velocity data could not be generated for the visitor Id.
558
+ * */
559
+ distinct_ip?: components['schemas']['VelocityData']
560
+ /** @description Is absent if the velocity data could not be generated for the visitor Id.
561
+ * */
562
+ distinct_linked_id?: components['schemas']['VelocityData']
563
+ /** @description Is absent if the velocity data could not be generated for the visitor Id.
564
+ * */
565
+ distinct_country?: components['schemas']['VelocityData']
566
+ /** @description Is absent if the velocity data could not be generated for the visitor Id.
567
+ * */
568
+ events?: components['schemas']['VelocityData']
569
+ /** @description Is absent if the velocity data could not be generated for the visitor Id.
570
+ * */
571
+ ip_events?: components['schemas']['VelocityData']
572
+ /** @description Is absent if the velocity data could not be generated for the visitor Id.
573
+ * */
574
+ distinct_ip_by_linked_id?: components['schemas']['VelocityData']
575
+ /** @description Is absent if the velocity data could not be generated for the visitor Id.
576
+ * */
577
+ distinct_visitor_id_by_linked_id?: components['schemas']['VelocityData']
578
+ }
579
+ /** @description `true` if the request came from a browser running inside a virtual machine (e.g. VMWare), `false` otherwise.
580
+ * */
581
+ VirtualMachine: boolean
582
+ /** @description VPN or other anonymizing service has been used when sending the request.
583
+ * */
584
+ Vpn: boolean
585
+ /**
586
+ * @description A confidence rating for the VPN detection result — "low", "medium", or "high". Depends on the combination of results returned from all VPN detection methods.
587
+ * @enum {string}
588
+ */
589
+ VpnConfidence: 'low' | 'medium' | 'high'
590
+ /** @description Local timezone which is used in timezone_mismatch method.
591
+ * */
592
+ VpnOriginTimezone: string
593
+ /** @description Country of the request (only for Android SDK version >= 2.4.0, ISO 3166 format or unknown).
594
+ * */
595
+ VpnOriginCountry: string
596
+ VpnMethods: {
597
+ /** @description The browser timezone doesn't match the timezone inferred from the request IP address. */
598
+ timezone_mismatch?: boolean
599
+ /** @description Request IP address is owned and used by a public VPN service provider. */
600
+ public_vpn?: boolean
601
+ /** @description This method applies to mobile devices only. Indicates the result of additional methods used to detect a VPN in mobile devices. */
602
+ auxiliary_mobile?: boolean
603
+ /** @description The browser runs on a different operating system than the operating system inferred from the request network signature. */
604
+ os_mismatch?: boolean
605
+ /** @description Request IP address belongs to a relay service provider, indicating the use of relay services like [Apple Private relay](https://support.apple.com/en-us/102602) or [Cloudflare Warp](https://developers.cloudflare.com/warp-client/).
606
+ *
607
+ * * Like VPNs, relay services anonymize the visitor's true IP address.
608
+ * * Unlike traditional VPNs, relay services don't let visitors spoof their location by choosing an exit node in a different country.
609
+ *
610
+ * This field allows you to differentiate VPN users and relay service users in your fraud prevention logic.
611
+ * */
612
+ relay?: boolean
613
+ }
614
+ /** @description Flag indicating if the request came from a high-activity visitor. */
615
+ HighActivity: boolean
616
+ /** @description Baseline measurement of canonical fonts rendered on the device. Numeric width metrics, in CSS pixels, for the canonical fonts collected by the agent.
617
+ * */
618
+ FontPreferences: {
619
+ /** Format: double */
620
+ default?: number
621
+ /** Format: double */
622
+ serif?: number
623
+ /** Format: double */
624
+ sans?: number
625
+ /** Format: double */
626
+ mono?: number
627
+ /** Format: double */
628
+ apple?: number
629
+ /** Format: double */
630
+ min?: number
631
+ /** Format: double */
632
+ system?: number
633
+ }
634
+ /** @description Bounding box metrics describing how the emoji glyph renders. */
635
+ Emoji: {
636
+ /** @description Font family reported by the browser when drawing the emoji. */
637
+ font?: string
638
+ /** Format: double */
639
+ width?: number
640
+ /** Format: double */
641
+ height?: number
642
+ /** Format: double */
643
+ top?: number
644
+ /** Format: double */
645
+ bottom?: number
646
+ /** Format: double */
647
+ left?: number
648
+ /** Format: double */
649
+ right?: number
650
+ /** Format: double */
651
+ x?: number
652
+ /** Format: double */
653
+ y?: number
654
+ }
655
+ /**
656
+ * @description List of fonts detected on the device.
657
+ * @example [
658
+ * "Arial Unicode MS",
659
+ * "Gill Sans",
660
+ * "Helvetica Neue",
661
+ * "Menlo"
662
+ * ]
663
+ */
664
+ Fonts: string[]
665
+ /**
666
+ * Format: int32
667
+ * @description Rounded amount of RAM (in gigabytes) reported by the browser.
668
+ * @example 8
669
+ */
670
+ DeviceMemory: number
671
+ /** @description Timezone identifier detected on the client. */
672
+ Timezone: string
673
+ /** @description Canvas fingerprint containing winding flag plus geometry/text hashes. */
674
+ Canvas: {
675
+ winding?: boolean
676
+ /** @description Hash of geometry rendering output or `unsupported` markers. */
677
+ geometry?: string
678
+ /** @description Hash of text rendering output or `unsupported` markers. */
679
+ text?: string
680
+ }
681
+ /** @description Navigator languages reported by the agent including fallbacks. Each inner array represents ordered language preferences reported by different APIs.
682
+ * */
683
+ Languages: string[][]
684
+ /** @description Hashes of WebGL context attributes and extension support. */
685
+ WebGlExtensions: {
686
+ context_attributes?: string
687
+ parameters?: string
688
+ shader_precisions?: string
689
+ extensions?: string
690
+ extension_parameters?: string
691
+ unsupported_extensions?: string[]
692
+ }
693
+ /** @description Render and vendor strings reported by the WebGL context. */
694
+ WebGlBasics: {
695
+ version?: string
696
+ vendor?: string
697
+ vendor_unmasked?: string
698
+ renderer?: string
699
+ renderer_unmasked?: string
700
+ shading_language_version?: string
701
+ }
702
+ /** @description Current screen resolution. */
703
+ ScreenResolution: number[]
704
+ /** @description Browser-reported touch capabilities. */
705
+ TouchSupport: {
706
+ touch_event?: boolean
707
+ touch_start?: boolean
708
+ /** Format: int64 */
709
+ max_touch_points?: number
710
+ }
711
+ /** @description Navigator `oscpu` string. */
712
+ Oscpu: string
713
+ /**
714
+ * Format: int32
715
+ * @description Integer representing the CPU architecture exposed by the browser.
716
+ */
717
+ Architecture: number
718
+ /** @description Whether the cookies are enabled in the browser. */
719
+ CookiesEnabled: boolean
720
+ /**
721
+ * Format: int32
722
+ * @description Number of logical CPU cores reported by the browser.
723
+ */
724
+ HardwareConcurrency: number
725
+ /** @description Locale derived from the Intl.DateTimeFormat API. Negative values indicate known error states. The negative statuses can be: - "-1": A permanent status for browsers that don't support Intl API. - "-2": A permanent status for browsers that don't supportDateTimeFormat constructor. - "-3": A permanent status for browsers in which DateTimeFormat locale is undefined or null.
726
+ * */
727
+ DateTimeLocale: string
728
+ /** @description Navigator vendor string. */
729
+ Vendor: string
730
+ /**
731
+ * Format: int32
732
+ * @description Screen color depth in bits.
733
+ */
734
+ ColorDepth: number
735
+ /** @description Navigator platform string. */
736
+ Platform: string
737
+ /** @description Whether sessionStorage is available. */
738
+ SessionStorage: boolean
739
+ /** @description Whether localStorage is available. */
740
+ LocalStorage: boolean
741
+ /**
742
+ * Format: double
743
+ * @description AudioContext fingerprint or negative status when unavailable. The negative statuses can be: - -1: A permanent status for those browsers which are known to always suspend audio context - -2: A permanent status for browsers that don't support the signal - -3: A temporary status that means that an unexpected timeout has happened
744
+ *
745
+ */
746
+ Audio: number
747
+ /** @description Browser plugins reported by `navigator.plugins`. */
748
+ Plugins: {
749
+ name: string
750
+ description?: string
751
+ mimeTypes?: {
752
+ type?: string
753
+ suffixes?: string
754
+ description?: string
755
+ }[]
756
+ }[]
757
+ /** @description Whether IndexedDB is available. */
758
+ IndexedDb: boolean
759
+ /** @description Hash of Math APIs used for entropy collection. */
760
+ Math: string
761
+ /** @description A curated subset of raw browser/device attributes that the API surface exposes. Each property contains a value or object with the data for the collected signal.
762
+ * */
763
+ RawDeviceAttributes: {
764
+ /** @description Baseline measurement of canonical fonts rendered on the device. Numeric width metrics, in CSS pixels, for the canonical fonts collected by the agent.
765
+ * */
766
+ font_preferences?: components['schemas']['FontPreferences']
767
+ /** @description Bounding box metrics describing how the emoji glyph renders. */
768
+ emoji?: components['schemas']['Emoji']
769
+ /** @description List of fonts detected on the device. */
770
+ fonts?: components['schemas']['Fonts']
771
+ /** @description Rounded amount of RAM (in gigabytes) reported by the browser. */
772
+ device_memory?: components['schemas']['DeviceMemory']
773
+ /** @description Timezone identifier detected on the client. */
774
+ timezone?: components['schemas']['Timezone']
775
+ /** @description Canvas fingerprint containing winding flag plus geometry/text hashes. */
776
+ canvas?: components['schemas']['Canvas']
777
+ /** @description Navigator languages reported by the agent including fallbacks. Each inner array represents ordered language preferences reported by different APIs.
778
+ * */
779
+ languages?: components['schemas']['Languages']
780
+ /** @description Hashes of WebGL context attributes and extension support. */
781
+ webgl_extensions?: components['schemas']['WebGlExtensions']
782
+ /** @description Render and vendor strings reported by the WebGL context. */
783
+ webgl_basics?: components['schemas']['WebGlBasics']
784
+ /** @description Current screen resolution. */
785
+ screen_resolution?: components['schemas']['ScreenResolution']
786
+ /** @description Browser-reported touch capabilities. */
787
+ touch_support?: components['schemas']['TouchSupport']
788
+ /** @description Navigator `oscpu` string. */
789
+ oscpu?: components['schemas']['Oscpu']
790
+ /** @description Integer representing the CPU architecture exposed by the browser. */
791
+ architecture?: components['schemas']['Architecture']
792
+ /** @description Whether the cookies are enabled in the browser. */
793
+ cookies_enabled?: components['schemas']['CookiesEnabled']
794
+ /** @description Number of logical CPU cores reported by the browser. */
795
+ hardware_concurrency?: components['schemas']['HardwareConcurrency']
796
+ /** @description Locale derived from the Intl.DateTimeFormat API. Negative values indicate known error states. The negative statuses can be: - "-1": A permanent status for browsers that don't support Intl API. - "-2": A permanent status for browsers that don't supportDateTimeFormat constructor. - "-3": A permanent status for browsers in which DateTimeFormat locale is undefined or null.
797
+ * */
798
+ date_time_locale?: components['schemas']['DateTimeLocale']
799
+ /** @description Navigator vendor string. */
800
+ vendor?: components['schemas']['Vendor']
801
+ /** @description Screen color depth in bits. */
802
+ color_depth?: components['schemas']['ColorDepth']
803
+ /** @description Navigator platform string. */
804
+ platform?: components['schemas']['Platform']
805
+ /** @description Whether sessionStorage is available. */
806
+ session_storage?: components['schemas']['SessionStorage']
807
+ /** @description Whether localStorage is available. */
808
+ local_storage?: components['schemas']['LocalStorage']
809
+ /** @description AudioContext fingerprint or negative status when unavailable. The negative statuses can be: - -1: A permanent status for those browsers which are known to always suspend audio context - -2: A permanent status for browsers that don't support the signal - -3: A temporary status that means that an unexpected timeout has happened
810
+ * */
811
+ audio?: components['schemas']['Audio']
812
+ /** @description Browser plugins reported by `navigator.plugins`. */
813
+ plugins?: components['schemas']['Plugins']
814
+ /** @description Whether IndexedDB is available. */
815
+ indexed_db?: components['schemas']['IndexedDb']
816
+ /** @description Hash of Math APIs used for entropy collection. */
817
+ math?: components['schemas']['Math']
818
+ }
819
+ /** @description Contains results from Fingerprint Identification and all active Smart Signals. */
820
+ Event: {
821
+ /** @description Unique identifier of the user's request. The first portion of the event_id is a unix epoch milliseconds timestamp For example: `1758130560902.8tRtrH`
822
+ * */
823
+ event_id: components['schemas']['EventId']
824
+ /** @description Timestamp of the event with millisecond precision in Unix time. */
825
+ timestamp: components['schemas']['Timestamp']
826
+ /** @description A customer-provided id that was sent with the request. */
827
+ linked_id?: components['schemas']['LinkedId']
828
+ /** @description Environment Id of the event. For example: `ae_47abaca3db2c7c43`
829
+ * */
830
+ environment_id?: components['schemas']['EnvironmentId']
831
+ /** @description Field is `true` if you have previously set the `suspect` flag for this event using the [Server API Update event endpoint](https://docs.fingerprint.com/reference/server-api-v4-update-event). */
832
+ suspect?: components['schemas']['Suspect']
833
+ /** @description Contains information about the SDK used to perform the request. */
834
+ sdk?: components['schemas']['SDK']
835
+ /** @description `true` if we determined that this payload was replayed, `false` otherwise.
836
+ * */
837
+ replayed?: components['schemas']['Replayed']
838
+ identification?: components['schemas']['Identification']
839
+ /** @description A supplementary browser identifier that prioritizes coverage over precision. The High Recall ID algorithm matches more generously, i.e., this identifier will remain the same even when there are subtle differences between two requests. This algorithm does not create as many new visitor IDs as the standard algorithms do, but there could be an increase in false-positive identification. */
840
+ supplementary_id_high_recall?: components['schemas']['SupplementaryIDHighRecall']
841
+ /** @description A customer-provided value or an object that was sent with the identification request or updated later. */
842
+ tags?: components['schemas']['Tags']
843
+ /** @description Page URL from which the request was sent. For example `https://example.com/`
844
+ * */
845
+ url?: components['schemas']['Url']
846
+ /** @description Bundle Id of the iOS application integrated with the Fingerprint SDK for the event. For example: `com.foo.app`
847
+ * */
848
+ bundle_id?: components['schemas']['BundleId']
849
+ /** @description Package name of the Android application integrated with the Fingerprint SDK for the event. For example: `com.foo.app`
850
+ * */
851
+ package_name?: components['schemas']['PackageName']
852
+ /** @description IP address of the requesting browser or bot. */
853
+ ip_address?: components['schemas']['IpAddress']
854
+ /** @description User Agent of the client, for example: `Mozilla/5.0 (Windows NT 6.1; Win64; x64) ....`
855
+ * */
856
+ user_agent?: components['schemas']['UserAgent']
857
+ /** @description Client Referrer field corresponds to the `document.referrer` field gathered during an identification request. The value is an empty string if the user navigated to the page directly (not through a link, but, for example, by using a bookmark) For example: `https://example.com/blog/my-article`
858
+ * */
859
+ client_referrer?: components['schemas']['ClientReferrer']
860
+ browser_details?: components['schemas']['BrowserDetails']
861
+ /** @description Proximity ID represents a fixed geographical zone in a discrete global grid within which the device is observed.
862
+ * */
863
+ proximity?: components['schemas']['Proximity']
864
+ /** @description Bot detection result:
865
+ * * `bad` - bad bot detected, such as Selenium, Puppeteer, Playwright, headless browsers, and so on
866
+ * * `good` - good bot detected, such as Google bot, Baidu Spider, AlexaBot and so on
867
+ * * `not_detected` - the visitor is not a bot
868
+ * */
869
+ bot?: components['schemas']['BotResult']
870
+ /** @description Additional classification of the bot type if detected.
871
+ * */
872
+ bot_type?: components['schemas']['BotType']
873
+ /** @description Extended bot information. */
874
+ bot_info?: components['schemas']['BotInfo']
875
+ /** @description Android specific cloned application detection. There are 2 values: * `true` - Presence of app cloners work detected (e.g. fully cloned application found or launch of it inside of a not main working profile detected). * `false` - No signs of cloned application detected or the client is not Android.
876
+ * */
877
+ cloned_app?: components['schemas']['ClonedApp']
878
+ /** @description `true` if the browser is Chrome with DevTools open or Firefox with Developer Tools open, `false` otherwise.
879
+ * */
880
+ developer_tools?: components['schemas']['DeveloperTools']
881
+ /** @description Android specific emulator detection. There are 2 values:
882
+ * * `true` - Emulated environment detected (e.g. launch inside of AVD).
883
+ * * `false` - No signs of emulated environment detected or the client is not Android.
884
+ * */
885
+ emulator?: components['schemas']['Emulator']
886
+ /** @description The time of the most recent factory reset that happened on the **mobile device** is expressed as Unix epoch time. When a factory reset cannot be detected on the mobile device or when the request is initiated from a browser, this field will correspond to the *epoch* time (i.e 1 Jan 1970 UTC) as a value of 0. See [Factory Reset Detection](https://docs.fingerprint.com/docs/smart-signals-reference#factory-reset-detection) to learn more about this Smart Signal.
887
+ * */
888
+ factory_reset_timestamp?: components['schemas']['FactoryReset']
889
+ /** @description [Frida](https://frida.re/docs/) detection for Android and iOS devices. There are 2 values:
890
+ * * `true` - Frida detected
891
+ * * `false` - No signs of Frida or the client is not a mobile device.
892
+ * */
893
+ frida?: components['schemas']['Frida']
894
+ ip_blocklist?: components['schemas']['IPBlockList']
895
+ /** @description Details about the request IP address. Has separate fields for v4 and v6 IP address versions. */
896
+ ip_info?: components['schemas']['IPInfo']
897
+ /** @description IP address was used by a public proxy provider or belonged to a known recent residential proxy
898
+ * */
899
+ proxy?: components['schemas']['Proxy']
900
+ /** @description Confidence level of the proxy detection. If a proxy is not detected, confidence is "high". If it's detected, can be "low", "medium", or "high".
901
+ * */
902
+ proxy_confidence?: components['schemas']['ProxyConfidence']
903
+ /** @description Proxy detection details (present if `proxy` is `true`) */
904
+ proxy_details?: components['schemas']['ProxyDetails']
905
+ /** @description `true` if we detected incognito mode used in the browser, `false` otherwise.
906
+ * */
907
+ incognito?: components['schemas']['Incognito']
908
+ /** @description iOS specific jailbreak detection. There are 2 values:
909
+ * * `true` - Jailbreak detected.
910
+ * * `false` - No signs of jailbreak or the client is not iOS.
911
+ * */
912
+ jailbroken?: components['schemas']['Jailbroken']
913
+ /** @description Flag indicating whether the request came from a mobile device with location spoofing enabled. */
914
+ location_spoofing?: components['schemas']['LocationSpoofing']
915
+ /** @description * `true` - When requests made from your users' mobile devices to Fingerprint servers have been intercepted and potentially modified.
916
+ * * `false` - Otherwise or when the request originated from a browser.
917
+ * See [MitM Attack Detection](https://docs.fingerprint.com/docs/smart-signals-reference#mitm-attack-detection) to learn more about this Smart Signal.
918
+ * */
919
+ mitm_attack?: components['schemas']['MitMAttack']
920
+ /** @description `true` if the request is from a privacy aware browser (e.g. Tor) or from a browser in which fingerprinting is blocked. Otherwise `false`.
921
+ * */
922
+ privacy_settings?: components['schemas']['PrivacySettings']
923
+ /** @description Android specific root management apps detection. There are 2 values:
924
+ * * `true` - Root Management Apps detected (e.g. Magisk).
925
+ * * `false` - No Root Management Apps detected or the client isn't Android.
926
+ * */
927
+ root_apps?: components['schemas']['RootApps']
928
+ /** @description Describes the action the client should take, according to the rule in the ruleset that matched the event. When getting an event by event ID, the rule_action will only be included when the ruleset_id query parameter is specified. */
929
+ rule_action?: components['schemas']['EventRuleAction']
930
+ /** @description Suspect Score is an easy way to integrate Smart Signals into your fraud protection work flow. It is a weighted representation of all Smart Signals present in the payload that helps identify suspicious activity. The value range is [0; S] where S is sum of all Smart Signals weights. See more details here: https://docs.fingerprint.com/docs/suspect-score
931
+ * */
932
+ suspect_score?: components['schemas']['SuspectScore']
933
+ /** @description Flag indicating browser tampering was detected. This happens when either:
934
+ * * There are inconsistencies in the browser configuration that cross internal tampering thresholds (see `tampering_details.anomaly_score`).
935
+ * * The browser signature resembles an "anti-detect" browser specifically designed to evade fingerprinting (see `tampering_details.anti_detect_browser`).
936
+ * */
937
+ tampering?: components['schemas']['Tampering']
938
+ tampering_details?: components['schemas']['TamperingDetails']
939
+ /** @description Sums key data points for a specific `visitor_id`, `ip_address` and `linked_id` at three distinct time
940
+ * intervals: 5 minutes, 1 hour, and 24 hours as follows:
941
+ *
942
+ * - Number of distinct IP addresses associated to the visitor Id.
943
+ * - Number of distinct linked Ids associated with the visitor Id.
944
+ * - Number of distinct countries associated with the visitor Id.
945
+ * - Number of identification events associated with the visitor Id.
946
+ * - Number of identification events associated with the detected IP address.
947
+ * - Number of distinct IP addresses associated with the provided linked Id.
948
+ * - Number of distinct visitor Ids associated with the provided linked Id.
949
+ *
950
+ * The `24h` interval of `distinct_ip`, `distinct_linked_id`, `distinct_country`,
951
+ * `distinct_ip_by_linked_id` and `distinct_visitor_id_by_linked_id` will be omitted
952
+ * if the number of `events` for the visitor Id in the last 24
953
+ * hours (`events.['24h']`) is higher than 20.000.
954
+ *
955
+ * All will not necessarily be returned in a response, some may be omitted if the
956
+ * associated event does not have the required data, such as a linked_id.
957
+ * */
958
+ velocity?: components['schemas']['Velocity']
959
+ /** @description `true` if the request came from a browser running inside a virtual machine (e.g. VMWare), `false` otherwise.
960
+ * */
961
+ virtual_machine?: components['schemas']['VirtualMachine']
962
+ /** @description VPN or other anonymizing service has been used when sending the request.
963
+ * */
964
+ vpn?: components['schemas']['Vpn']
965
+ /** @description A confidence rating for the VPN detection result — "low", "medium", or "high". Depends on the combination of results returned from all VPN detection methods. */
966
+ vpn_confidence?: components['schemas']['VpnConfidence']
967
+ /** @description Local timezone which is used in timezone_mismatch method.
968
+ * */
969
+ vpn_origin_timezone?: components['schemas']['VpnOriginTimezone']
970
+ /** @description Country of the request (only for Android SDK version >= 2.4.0, ISO 3166 format or unknown).
971
+ * */
972
+ vpn_origin_country?: components['schemas']['VpnOriginCountry']
973
+ vpn_methods?: components['schemas']['VpnMethods']
974
+ /** @description Flag indicating if the request came from a high-activity visitor. */
975
+ high_activity_device?: components['schemas']['HighActivity']
976
+ /** @description A curated subset of raw browser/device attributes that the API surface exposes. Each property contains a value or object with the data for the collected signal.
977
+ * */
978
+ raw_device_attributes?: components['schemas']['RawDeviceAttributes']
979
+ }
980
+ /**
981
+ * @description Error code:
982
+ * * `request_cannot_be_parsed` - The query parameters or JSON payload contains some errors
983
+ * that prevented us from parsing it (wrong type/surpassed limits).
984
+ * * `secret_api_key_required` - secret API key in header is missing or empty.
985
+ * * `secret_api_key_not_found` - No Fingerprint workspace found for specified secret API key.
986
+ * * `public_api_key_required` - public API key in header is missing or empty.
987
+ * * `public_api_key_not_found` - No Fingerprint workspace found for specified public API key.
988
+ * * `subscription_not_active` - Fingerprint workspace is not active.
989
+ * * `wrong_region` - Server and workspace region differ.
990
+ * * `feature_not_enabled` - This feature (for example, Delete API) is not enabled for your workspace.
991
+ * * `request_not_found` - The specified event ID was not found. It never existed, expired, or it has been deleted.
992
+ * * `visitor_not_found` - The specified visitor ID was not found. It never existed or it may have already been deleted.
993
+ * * `too_many_requests` - The limit on secret API key requests per second has been exceeded.
994
+ * * `state_not_ready` - The event specified with event ID is
995
+ * not ready for updates yet. Try again.
996
+ * This error happens in rare cases when update API is called immediately
997
+ * after receiving the event ID on the client. In case you need to send
998
+ * information right away, we recommend using the JS agent API instead.
999
+ * * `failed` - Internal server error.
1000
+ * * `event_not_found` - The specified event ID was not found. It never existed, expired, or it has been deleted.
1001
+ * * `missing_module` - The request is invalid because it is missing a required module.
1002
+ * * `payload_too_large` - The request payload is too large and cannot be processed.
1003
+ * * `service_unavailable` - The service was unable to process the request.
1004
+ * * `ruleset_not_found` - The specified ruleset was not found. It never existed or it has been deleted.
1005
+ *
1006
+ * @enum {string}
1007
+ */
1008
+ ErrorCode:
1009
+ | 'request_cannot_be_parsed'
1010
+ | 'secret_api_key_required'
1011
+ | 'secret_api_key_not_found'
1012
+ | 'public_api_key_required'
1013
+ | 'public_api_key_not_found'
1014
+ | 'subscription_not_active'
1015
+ | 'wrong_region'
1016
+ | 'feature_not_enabled'
1017
+ | 'request_not_found'
1018
+ | 'visitor_not_found'
1019
+ | 'too_many_requests'
1020
+ | 'state_not_ready'
1021
+ | 'failed'
1022
+ | 'event_not_found'
1023
+ | 'missing_module'
1024
+ | 'payload_too_large'
1025
+ | 'service_unavailable'
1026
+ | 'ruleset_not_found'
1027
+ Error: {
1028
+ /** @description Error code:
1029
+ * * `request_cannot_be_parsed` - The query parameters or JSON payload contains some errors
1030
+ * that prevented us from parsing it (wrong type/surpassed limits).
1031
+ * * `secret_api_key_required` - secret API key in header is missing or empty.
1032
+ * * `secret_api_key_not_found` - No Fingerprint workspace found for specified secret API key.
1033
+ * * `public_api_key_required` - public API key in header is missing or empty.
1034
+ * * `public_api_key_not_found` - No Fingerprint workspace found for specified public API key.
1035
+ * * `subscription_not_active` - Fingerprint workspace is not active.
1036
+ * * `wrong_region` - Server and workspace region differ.
1037
+ * * `feature_not_enabled` - This feature (for example, Delete API) is not enabled for your workspace.
1038
+ * * `request_not_found` - The specified event ID was not found. It never existed, expired, or it has been deleted.
1039
+ * * `visitor_not_found` - The specified visitor ID was not found. It never existed or it may have already been deleted.
1040
+ * * `too_many_requests` - The limit on secret API key requests per second has been exceeded.
1041
+ * * `state_not_ready` - The event specified with event ID is
1042
+ * not ready for updates yet. Try again.
1043
+ * This error happens in rare cases when update API is called immediately
1044
+ * after receiving the event ID on the client. In case you need to send
1045
+ * information right away, we recommend using the JS agent API instead.
1046
+ * * `failed` - Internal server error.
1047
+ * * `event_not_found` - The specified event ID was not found. It never existed, expired, or it has been deleted.
1048
+ * * `missing_module` - The request is invalid because it is missing a required module.
1049
+ * * `payload_too_large` - The request payload is too large and cannot be processed.
1050
+ * * `service_unavailable` - The service was unable to process the request.
1051
+ * * `ruleset_not_found` - The specified ruleset was not found. It never existed or it has been deleted.
1052
+ * */
1053
+ code: components['schemas']['ErrorCode']
1054
+ message: string
1055
+ }
1056
+ ErrorResponse: {
1057
+ error: components['schemas']['Error']
1058
+ }
1059
+ EventUpdate: {
1060
+ /** @description Linked Id value to assign to the existing event */
1061
+ linked_id?: string
1062
+ /** @description A customer-provided value or an object that was sent with the identification request or updated later. */
1063
+ tags?: {
1064
+ [key: string]: unknown
1065
+ }
1066
+ /** @description Suspect flag indicating observed suspicious or fraudulent event */
1067
+ suspect?: boolean
1068
+ }
1069
+ /** @description Contains a list of all identification events matching the specified search criteria. */
1070
+ EventSearch: {
1071
+ events: components['schemas']['Event'][]
1072
+ /** @description Use this value in the `pagination_key` parameter to request the next page of search results. */
1073
+ pagination_key?: string
1074
+ /**
1075
+ * Format: int64
1076
+ * @description This value represents the total number of events matching the search query, up to the limit provided in the `total_hits` query parameter. Only present if the `total_hits` query parameter was provided.
1077
+ */
1078
+ total_hits?: number
1079
+ }
1080
+ /**
1081
+ * @description Filter events by the Bot Detection result, specifically:
1082
+ * `all` - events where any kind of bot was detected.
1083
+ * `good` - events where a good bot was detected.
1084
+ * `bad` - events where a bad bot was detected.
1085
+ * `none` - events where no bot was detected.
1086
+ * > Note: When using this parameter, only events with the `bot` property set to a valid value are returned. Events without a `bot` Smart Signal result are left out of the response.
1087
+ *
1088
+ * @enum {string}
1089
+ */
1090
+ SearchEventsBot: 'all' | 'good' | 'bad' | 'none'
1091
+ /**
1092
+ * @description Filter events by VPN Detection result confidence level.
1093
+ * `high` - events with high VPN Detection confidence.
1094
+ * `medium` - events with medium VPN Detection confidence.
1095
+ * `low` - events with low VPN Detection confidence.
1096
+ * > Note: When using this parameter, only events with the `vpn.confidence` property set to a valid value are returned. Events without a `vpn` Smart Signal result are left out of the response.
1097
+ *
1098
+ * @enum {string}
1099
+ */
1100
+ SearchEventsVpnConfidence: 'high' | 'medium' | 'low'
1101
+ /**
1102
+ * @description Filter events by the SDK Platform associated with the identification event (`sdk.platform` property) .
1103
+ * `js` - Javascript agent (Web).
1104
+ * `ios` - Apple iOS based devices.
1105
+ * `android` - Android based devices.
1106
+ *
1107
+ * @enum {string}
1108
+ */
1109
+ SearchEventsSdkPlatform: 'js' | 'android' | 'ios'
1110
+ }
1111
+ responses: never
1112
+ parameters: never
1113
+ requestBodies: never
1114
+ headers: never
1115
+ pathItems: never
1116
+ }
1117
+ export type $defs = Record<string, never>
1118
+ export interface operations {
1119
+ getEvent: {
1120
+ parameters: {
1121
+ query?: {
1122
+ /** @description The ID of the ruleset to evaluate against the event, producing the action to take for this event.
1123
+ * The resulting action is returned in the `rule_action` attribute of the response.
1124
+ * */
1125
+ ruleset_id?: string
1126
+ }
1127
+ header?: never
1128
+ path: {
1129
+ /** @description The unique [identifier](https://docs.fingerprint.com/reference/js-agent-v4-get-function#event_id) of each identification request (`requestId` can be used in its place). */
1130
+ event_id: string
1131
+ }
1132
+ cookie?: never
1133
+ }
1134
+ requestBody?: never
1135
+ responses: {
1136
+ /** @description OK. */
1137
+ 200: {
1138
+ headers: {
1139
+ [name: string]: unknown
1140
+ }
1141
+ content: {
1142
+ 'application/json': components['schemas']['Event']
1143
+ }
1144
+ }
1145
+ /** @description Bad request. The event Id provided is not valid. */
1146
+ 400: {
1147
+ headers: {
1148
+ [name: string]: unknown
1149
+ }
1150
+ content: {
1151
+ 'application/json': components['schemas']['ErrorResponse']
1152
+ }
1153
+ }
1154
+ /** @description Forbidden. Access to this API is denied. */
1155
+ 403: {
1156
+ headers: {
1157
+ [name: string]: unknown
1158
+ }
1159
+ content: {
1160
+ 'application/json': components['schemas']['ErrorResponse']
1161
+ }
1162
+ }
1163
+ /** @description Not found. The event Id cannot be found in this workspace's data. */
1164
+ 404: {
1165
+ headers: {
1166
+ [name: string]: unknown
1167
+ }
1168
+ content: {
1169
+ 'application/json': components['schemas']['ErrorResponse']
1170
+ }
1171
+ }
1172
+ /** @description Too Many Requests. The request is throttled. */
1173
+ 429: {
1174
+ headers: {
1175
+ [name: string]: unknown
1176
+ }
1177
+ content: {
1178
+ 'application/json': components['schemas']['ErrorResponse']
1179
+ }
1180
+ }
1181
+ /** @description Workspace error. */
1182
+ 500: {
1183
+ headers: {
1184
+ [name: string]: unknown
1185
+ }
1186
+ content: {
1187
+ 'application/json': components['schemas']['ErrorResponse']
1188
+ }
1189
+ }
1190
+ }
1191
+ }
1192
+ updateEvent: {
1193
+ parameters: {
1194
+ query?: never
1195
+ header?: never
1196
+ path: {
1197
+ /** @description The unique event [identifier](https://docs.fingerprint.com/reference/js-agent-v4-get-function#event_id). */
1198
+ event_id: string
1199
+ }
1200
+ cookie?: never
1201
+ }
1202
+ requestBody: {
1203
+ content: {
1204
+ 'application/json': components['schemas']['EventUpdate']
1205
+ }
1206
+ }
1207
+ responses: {
1208
+ /** @description OK. */
1209
+ 200: {
1210
+ headers: {
1211
+ [name: string]: unknown
1212
+ }
1213
+ content?: never
1214
+ }
1215
+ /** @description Bad request. The request payload is not valid. */
1216
+ 400: {
1217
+ headers: {
1218
+ [name: string]: unknown
1219
+ }
1220
+ content: {
1221
+ 'application/json': components['schemas']['ErrorResponse']
1222
+ }
1223
+ }
1224
+ /** @description Forbidden. Access to this API is denied. */
1225
+ 403: {
1226
+ headers: {
1227
+ [name: string]: unknown
1228
+ }
1229
+ content: {
1230
+ 'application/json': components['schemas']['ErrorResponse']
1231
+ }
1232
+ }
1233
+ /** @description Not found. The event Id cannot be found in this workspace's data. */
1234
+ 404: {
1235
+ headers: {
1236
+ [name: string]: unknown
1237
+ }
1238
+ content: {
1239
+ 'application/json': components['schemas']['ErrorResponse']
1240
+ }
1241
+ }
1242
+ /** @description Conflict. The event is not mutable yet. */
1243
+ 409: {
1244
+ headers: {
1245
+ [name: string]: unknown
1246
+ }
1247
+ content: {
1248
+ 'application/json': components['schemas']['ErrorResponse']
1249
+ }
1250
+ }
1251
+ }
1252
+ }
1253
+ searchEvents: {
1254
+ parameters: {
1255
+ query?: {
1256
+ /** @description Limit the number of events returned.
1257
+ * */
1258
+ limit?: number
1259
+ /** @description Use `pagination_key` to get the next page of results.
1260
+ *
1261
+ * When more results are available (e.g., you requested up to 100 results for your query using `limit`, but there are more than 100 events total matching your request), the `pagination_key` field is added to the response. The pagination key is an arbitrary string that should not be interpreted in any way and should be passed as-is. In the following request, use that value in the `pagination_key` parameter to get the next page of results:
1262
+ *
1263
+ * 1. First request, returning most recent 200 events: `GET api-base-url/events?limit=100`
1264
+ * 2. Use `response.pagination_key` to get the next page of results: `GET api-base-url/events?limit=100&pagination_key=1740815825085`
1265
+ * */
1266
+ pagination_key?: string
1267
+ /** @description Unique [visitor identifier](https://docs.fingerprint.com/reference/js-agent-v4-get-function#visitor_id) issued by Fingerprint Identification and all active Smart Signals.
1268
+ * Filter for events matching this `visitor_id`.
1269
+ * */
1270
+ visitor_id?: string
1271
+ /** @description Filter events by the Bot Detection result, specifically:
1272
+ * `all` - events where any kind of bot was detected.
1273
+ * `good` - events where a good bot was detected.
1274
+ * `bad` - events where a bad bot was detected.
1275
+ * `none` - events where no bot was detected.
1276
+ * > Note: When using this parameter, only events with the `bot` property set to a valid value are returned. Events without a `bot` Smart Signal result are left out of the response.
1277
+ * */
1278
+ bot?: components['schemas']['SearchEventsBot']
1279
+ /** @description Filter events by IP address or IP range (if CIDR notation is used). If CIDR notation is not used, a /32 for IPv4 or /128 for IPv6 is assumed.
1280
+ * Examples of range based queries: 10.0.0.0/24, 192.168.0.1/32
1281
+ * */
1282
+ ip_address?: string
1283
+ /** @description Filter events by the ASN associated with the event's IP address.
1284
+ * This corresponds to the `ip_info.(v4|v6).asn` property in the response.
1285
+ * */
1286
+ asn?: string
1287
+ /** @description Filter events by your custom identifier.
1288
+ *
1289
+ * You can use [linked Ids](https://docs.fingerprint.com/reference/js-agent-v4-get-function#linkedid) to associate identification requests with your own identifier, for example, session Id, purchase Id, or transaction Id. You can then use this `linked_id` parameter to retrieve all events associated with your custom identifier.
1290
+ * */
1291
+ linked_id?: string
1292
+ /** @description Filter events by the URL (`url` property) associated with the event.
1293
+ * */
1294
+ url?: string
1295
+ /** @description Filter events by the Bundle ID (iOS) associated with the event.
1296
+ * */
1297
+ bundle_id?: string
1298
+ /** @description Filter events by the Package Name (Android) associated with the event.
1299
+ * */
1300
+ package_name?: string
1301
+ /** @description Filter events by the origin field of the event. This is applicable to web events only (e.g., https://example.com)
1302
+ * */
1303
+ origin?: string
1304
+ /** @description Filter events with a timestamp greater than the start time, in Unix time (milliseconds).
1305
+ * */
1306
+ start?: number
1307
+ /** @description Filter events with a timestamp smaller than the end time, in Unix time (milliseconds).
1308
+ * */
1309
+ end?: number
1310
+ /** @description Sort events in reverse timestamp order.
1311
+ * */
1312
+ reverse?: boolean
1313
+ /** @description Filter events previously tagged as suspicious via the [Update API](https://docs.fingerprint.com/reference/server-api-v4-update-event).
1314
+ * > Note: When using this parameter, only events with the `suspect` property explicitly set to `true` or `false` are returned. Events with undefined `suspect` property are left out of the response.
1315
+ * */
1316
+ suspect?: boolean
1317
+ /** @description Filter events by VPN Detection result.
1318
+ * > Note: When using this parameter, only events with the `vpn` property set to `true` or `false` are returned. Events without a `vpn` Smart Signal result are left out of the response.
1319
+ * */
1320
+ vpn?: boolean
1321
+ /** @description Filter events by Virtual Machine Detection result.
1322
+ * > Note: When using this parameter, only events with the `virtual_machine` property set to `true` or `false` are returned. Events without a `virtual_machine` Smart Signal result are left out of the response.
1323
+ * */
1324
+ virtual_machine?: boolean
1325
+ /** @description Filter events by Browser Tampering Detection result.
1326
+ * > Note: When using this parameter, only events with the `tampering.result` property set to `true` or `false` are returned. Events without a `tampering` Smart Signal result are left out of the response.
1327
+ * */
1328
+ tampering?: boolean
1329
+ /** @description Filter events by Anti-detect Browser Detection result.
1330
+ * > Note: When using this parameter, only events with the `tampering.anti_detect_browser` property set to `true` or `false` are returned. Events without a `tampering` Smart Signal result are left out of the response.
1331
+ * */
1332
+ anti_detect_browser?: boolean
1333
+ /** @description Filter events by Browser Incognito Detection result.
1334
+ * > Note: When using this parameter, only events with the `incognito` property set to `true` or `false` are returned. Events without an `incognito` Smart Signal result are left out of the response.
1335
+ * */
1336
+ incognito?: boolean
1337
+ /** @description Filter events by Privacy Settings Detection result.
1338
+ * > Note: When using this parameter, only events with the `privacy_settings` property set to `true` or `false` are returned. Events without a `privacy_settings` Smart Signal result are left out of the response.
1339
+ * */
1340
+ privacy_settings?: boolean
1341
+ /** @description Filter events by Jailbroken Device Detection result.
1342
+ * > Note: When using this parameter, only events with the `jailbroken` property set to `true` or `false` are returned. Events without a `jailbroken` Smart Signal result are left out of the response.
1343
+ * */
1344
+ jailbroken?: boolean
1345
+ /** @description Filter events by Frida Detection result.
1346
+ * > Note: When using this parameter, only events with the `frida` property set to `true` or `false` are returned. Events without a `frida` Smart Signal result are left out of the response.
1347
+ * */
1348
+ frida?: boolean
1349
+ /** @description Filter events by Factory Reset Detection result.
1350
+ * > Note: When using this parameter, only events with a `factory_reset` time. Events without a `factory_reset` Smart Signal result are left out of the response.
1351
+ * */
1352
+ factory_reset?: boolean
1353
+ /** @description Filter events by Cloned App Detection result.
1354
+ * > Note: When using this parameter, only events with the `cloned_app` property set to `true` or `false` are returned. Events without a `cloned_app` Smart Signal result are left out of the response.
1355
+ * */
1356
+ cloned_app?: boolean
1357
+ /** @description Filter events by Android Emulator Detection result.
1358
+ * > Note: When using this parameter, only events with the `emulator` property set to `true` or `false` are returned. Events without an `emulator` Smart Signal result are left out of the response.
1359
+ * */
1360
+ emulator?: boolean
1361
+ /** @description Filter events by Rooted Device Detection result.
1362
+ * > Note: When using this parameter, only events with the `root_apps` property set to `true` or `false` are returned. Events without a `root_apps` Smart Signal result are left out of the response.
1363
+ * */
1364
+ root_apps?: boolean
1365
+ /** @description Filter events by VPN Detection result confidence level.
1366
+ * `high` - events with high VPN Detection confidence.
1367
+ * `medium` - events with medium VPN Detection confidence.
1368
+ * `low` - events with low VPN Detection confidence.
1369
+ * > Note: When using this parameter, only events with the `vpn.confidence` property set to a valid value are returned. Events without a `vpn` Smart Signal result are left out of the response.
1370
+ * */
1371
+ vpn_confidence?: components['schemas']['SearchEventsVpnConfidence']
1372
+ /** @description Filter events with Suspect Score result above a provided minimum threshold.
1373
+ * > Note: When using this parameter, only events where the `suspect_score` property set to a value exceeding your threshold are returned. Events without a `suspect_score` Smart Signal result are left out of the response.
1374
+ * */
1375
+ min_suspect_score?: number
1376
+ /** @description Filter events by Developer Tools detection result.
1377
+ * > Note: When using this parameter, only events with the `developer_tools` property set to `true` or `false` are returned. Events without a `developer_tools` Smart Signal result are left out of the response.
1378
+ * */
1379
+ developer_tools?: boolean
1380
+ /** @description Filter events by Location Spoofing detection result.
1381
+ * > Note: When using this parameter, only events with the `location_spoofing` property set to `true` or `false` are returned. Events without a `location_spoofing` Smart Signal result are left out of the response.
1382
+ * */
1383
+ location_spoofing?: boolean
1384
+ /** @description Filter events by MITM (Man-in-the-Middle) Attack detection result.
1385
+ * > Note: When using this parameter, only events with the `mitm_attack` property set to `true` or `false` are returned. Events without a `mitm_attack` Smart Signal result are left out of the response.
1386
+ * */
1387
+ mitm_attack?: boolean
1388
+ /** @description Filter events by Proxy detection result.
1389
+ * > Note: When using this parameter, only events with the `proxy` property set to `true` or `false` are returned. Events without a `proxy` Smart Signal result are left out of the response.
1390
+ * */
1391
+ proxy?: boolean
1392
+ /** @description Filter events by a specific SDK version associated with the identification event (`sdk.version` property). Example: `3.11.14`
1393
+ * */
1394
+ sdk_version?: string
1395
+ /** @description Filter events by the SDK Platform associated with the identification event (`sdk.platform` property) .
1396
+ * `js` - Javascript agent (Web).
1397
+ * `ios` - Apple iOS based devices.
1398
+ * `android` - Android based devices.
1399
+ * */
1400
+ sdk_platform?: components['schemas']['SearchEventsSdkPlatform']
1401
+ /** @description Filter for events by providing one or more environment IDs (`environment_id` property).
1402
+ * */
1403
+ environment?: string[]
1404
+ /** @description Filter events by the most precise Proximity ID provided by default.
1405
+ * > Note: When using this parameter, only events with the `proximity.id` property matching the provided ID are returned. Events without a `proximity` result are left out of the response.
1406
+ * */
1407
+ proximity_id?: string
1408
+ /** @description When set, the response will include a `total_hits` property with a count of total query matches across all pages, up to the specified limit.
1409
+ * */
1410
+ total_hits?: number
1411
+ /** @description Filter events by Tor Node detection result.
1412
+ * > Note: When using this parameter, only events with the `tor_node` property set to `true` or `false` are returned. Events without a `tor_node` detection result are left out of the response.
1413
+ * */
1414
+ tor_node?: boolean
1415
+ }
1416
+ header?: never
1417
+ path?: never
1418
+ cookie?: never
1419
+ }
1420
+ requestBody?: never
1421
+ responses: {
1422
+ /** @description Events matching the filter(s). */
1423
+ 200: {
1424
+ headers: {
1425
+ [name: string]: unknown
1426
+ }
1427
+ content: {
1428
+ 'application/json': components['schemas']['EventSearch']
1429
+ }
1430
+ }
1431
+ /** @description Bad request. One or more supplied search parameters are invalid, or a required parameter is missing. */
1432
+ 400: {
1433
+ headers: {
1434
+ [name: string]: unknown
1435
+ }
1436
+ content: {
1437
+ 'application/json': components['schemas']['ErrorResponse']
1438
+ }
1439
+ }
1440
+ /** @description Forbidden. Access to this API is denied. */
1441
+ 403: {
1442
+ headers: {
1443
+ [name: string]: unknown
1444
+ }
1445
+ content: {
1446
+ 'application/json': components['schemas']['ErrorResponse']
1447
+ }
1448
+ }
1449
+ /** @description Workspace error. */
1450
+ 500: {
1451
+ headers: {
1452
+ [name: string]: unknown
1453
+ }
1454
+ content: {
1455
+ 'application/json': components['schemas']['ErrorResponse']
1456
+ }
1457
+ }
1458
+ }
1459
+ }
1460
+ deleteVisitorData: {
1461
+ parameters: {
1462
+ query?: never
1463
+ header?: never
1464
+ path: {
1465
+ /** @description The [visitor ID](https://docs.fingerprint.com/reference/js-agent-v4-get-function#visitor_id) you want to delete. */
1466
+ visitor_id: string
1467
+ }
1468
+ cookie?: never
1469
+ }
1470
+ requestBody?: never
1471
+ responses: {
1472
+ /** @description OK. The visitor ID is scheduled for deletion. */
1473
+ 200: {
1474
+ headers: {
1475
+ [name: string]: unknown
1476
+ }
1477
+ content?: never
1478
+ }
1479
+ /** @description Bad request. The visitor ID parameter is missing or in the wrong format. */
1480
+ 400: {
1481
+ headers: {
1482
+ [name: string]: unknown
1483
+ }
1484
+ content: {
1485
+ 'application/json': components['schemas']['ErrorResponse']
1486
+ }
1487
+ }
1488
+ /** @description Forbidden. Access to this API is denied. */
1489
+ 403: {
1490
+ headers: {
1491
+ [name: string]: unknown
1492
+ }
1493
+ content: {
1494
+ 'application/json': components['schemas']['ErrorResponse']
1495
+ }
1496
+ }
1497
+ /** @description Not found. The visitor ID cannot be found in this workspace's data. */
1498
+ 404: {
1499
+ headers: {
1500
+ [name: string]: unknown
1501
+ }
1502
+ content: {
1503
+ 'application/json': components['schemas']['ErrorResponse']
1504
+ }
1505
+ }
1506
+ /** @description Too Many Requests. The request is throttled. */
1507
+ 429: {
1508
+ headers: {
1509
+ [name: string]: unknown
1510
+ }
1511
+ content: {
1512
+ 'application/json': components['schemas']['ErrorResponse']
1513
+ }
1514
+ }
1515
+ }
1516
+ }
1517
+ }