Name Description Size
additional-bids.py Endpoint to return additional bids in the appropriate response header. Additional bids are returned using the "Ad-Auction-Additional-Bid" response header, as described at https://github.com/WICG/turtledove/blob/main/FLEDGE.md#63-http-response-headers. This script generates one of "Ad-Auction-Additional-Bid" response header for each additional bid provided in a url-encoded `additionalBids` query parameter. All requests to this endpoint requires a "Sec-Ad-Auction-Fetch" request header with a value of b"?1"; this entrypoint otherwise returns a 400 response. 5557
authorize-server-response.py 253
ba-fledge-util.sub.js 11461
ba-public-keys 110
bidding-logic.sub.py function generateBid(interestGroup, auctionSignals, perBuyerSignals, trustedBiddingSignals, browserSignals, directFromSellerSignals, crossOriginTrustedBiddingSignals) {{ {{{{GET[generateBid]}}}}; return {{ bid: {bid}, {bidCurrency} {allowComponentAuction} render: interestGroup.ads[0].renderURL }}; }} 3364
decision-logic.sub.py function scoreAd(adMetadata, bid, auctionConfig, trustedScoringSignals, browserSignals, directFromSellerSignals, crossOriginTrustedScoringSignals) { // Don't bid on interest group with the wrong uuid. This is to prevent // left over interest groups from other tests from affecting auction // results. if (!browserSignals.renderURL.endsWith('uuid={{GET[uuid]}}') && !browserSignals.renderURL.includes('uuid={{GET[uuid]}}&')) { return 0; } {{GET[scoreAd]}}; return {desirability: 2 * bid, allowComponentAuction: true}; } 2823
direct-from-seller-signals.py 5533
ed25519.py NB: This code is not safe for use with secret keys or secret data. The only safe use of this code is for verifying signatures on public messages. Functions for computing the public key of a secret key and for signing a message are included, namely publickey_unsafe and signature_unsafe, for testing purposes only. The root of the problem is that Python's long-integer arithmetic is not designed for use in cryptography. Specifically, it may take more or less time to execute an operation depending on the values of the inputs, and its memory access patterns may also depend on the inputs. This opens it to timing and cache side-channel attacks which can disclose data to an attacker. We rely on Python's long-integer arithmetic, so we cannot handle secrets without risking their disclosure. 7228
empty.html 16
fenced-frame.sub.py <!DOCTYPE html> <html> <head> <!--- Allow injected scripts to use functions in fledge-util.sub.js ---> <base href=".."> <script src="/resources/testharness.js"></script> <script src="/common/utils.js"></script> <script src="resources/fledge-util.sub.js"></script> </head> <body> <script> {{GET[script]}} </script> </body> </html> 819
fledge-util.sub.js 41024
fledge_http_server_util.py Utility functions shared across multiple endpoints. 5511
incrementer.wasm 46
permissions.py Methods for the interest group cross-origin permissions endpoint. 2259
real-time-report.py Handles POST request for reports. Retrieves the report from the request body and stores the report in the stash. If clear_stash is specified in the query params, clears the stash. 2713
redirect-to-trusted-signals.py 1136
redirect.py 518
request-tracker.py 6469
service-worker-helper.js 774
service-worker-helper.js.headers 42
set-cookie.asis 51
subordinate-frame.sub.html 3933
subordinate-frame.sub.html.headers 38
trusted-bidding-signals.py 6759
trusted-scoring-signals.py 4834
update-url.py 243
wasm-helper.py 1352
worklet-helpers.js 693