🛡️ Enterprise#
capmonster_python.DataDomeTask #
Bases: TaskPayload
, UserAgentPayload
Represents a task payload for solving captchas on the DataDome platform.
Attributes:
Name | Type | Description |
---|---|---|
websiteURL |
str
|
A string that contains the address of the page where the captcha is solved. |
proxy |
Optional[ProxyPayload]
|
Optional proxy settings, represented as a ProxyPayload. Defaults to None. |
metadata |
DataDomeMetadata
|
Additional metadata about the captcha, represented as a DataDomeMetadata. Defaults to None. |
capmonster_python.DataDomeMetadata #
Bases: BaseModel
Represents metadata related to DataDome.
Attributes:
Name | Type | Description |
---|---|---|
htmlPageBase64 |
Optional[str]
|
Optional; Contains additional data about the captcha in Base64-encoded format. |
captchaUrl |
Optional[str]
|
Optional; URL pointing to the captcha, typically formatted like: "https://geo.captcha-delivery.com/captcha/?initialCid=...". |
datadomeCookie |
str
|
Mandatory; Stores the DataDome cookies, retrievable on
the page using |
Raises:
Type | Description |
---|---|
CapmonsterValidationException
|
If neither |
capmonster_python.ImpervaTask #
Bases: TaskPayload
, UserAgentPayload
Represents a task for handling and solving an Imperva-based challenge.
Attributes:
Name | Type | Description |
---|---|---|
type |
str
|
The identifier for the type of task. This attribute is |
class_ |
str
|
The identifier for the class of the task. This attribute is |
websiteURL |
str
|
The URL of the website targeted for solving the challenge. |
metadata |
ImpervaTaskMetadata
|
Encapsulated metadata specific to the |
capmonster_python.ImpervaTaskMetadata #
Bases: BaseModel
Represents metadata related to an Imperva task.
Attributes:
Name | Type | Description |
---|---|---|
incapsulaScriptUrl |
str
|
Name of the Incapsula JS file. |
incapsulaCookie |
str
|
Your cookies from Incapsula. They can be obtained on the page using document.cookie. |
reese84UrlEndpoint |
Optional[str]
|
Optional. The name of the endpoint where the reese84 fingerprint is sent, found among the network requests and typically ending with "?d=site.com". |