mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-26 06:11:37 +00:00
4c2d6784e1
--HG-- extra : rebase_source : 41417b60ed6603d613b65cd7e96a5ba8121b05e5
249 lines
10 KiB
Plaintext
249 lines
10 KiB
Plaintext
#
|
|
# This Source Code Form is subject to the terms of the Mozilla Public
|
|
# License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
#
|
|
# This file defines the locations at which this HTTP server may be accessed.
|
|
# It is referred to by the following page, so if this file moves, that page must
|
|
# be modified accordingly:
|
|
#
|
|
# https://developer.mozilla.org/en/docs/Mochitest#How_do_I_test_issues_which_only_show_up_when_tests_are_run_across_domains.3F
|
|
#
|
|
# Empty lines and lines which begin with "#" are ignored and may be used for
|
|
# storing comments. All other lines consist of an origin followed by whitespace
|
|
# and a comma-separated list of options (if indeed any options are needed).
|
|
#
|
|
# The format of an origin is, referring to RFC 2396, a scheme (either "http" or
|
|
# "https"), followed by "://", followed by a host, followed by ":", followed by
|
|
# a port number. The colon and port number must be present even if the port
|
|
# number is the default for the protocol.
|
|
#
|
|
# Unrecognized options are ignored. Recognized options are "primary" and
|
|
# "privileged", "nocert", "cert=some_cert_nickname", "redir=hostname" and
|
|
# "failHandshake".
|
|
#
|
|
# "primary" denotes a location which is the canonical location of
|
|
# the server; this location is the one assumed for requests which don't
|
|
# otherwise identify a particular origin (e.g. HTTP/1.0 requests).
|
|
#
|
|
# "privileged" denotes a location which should have the ability to request
|
|
# elevated privileges; the default is no privileges.
|
|
#
|
|
# "nocert" makes sense only for https:// hosts and means there is not
|
|
# any certificate automatically generated for this host.
|
|
#
|
|
# "failHandshake" causes the tls handshake to fail (by sending a client hello to
|
|
# the client).
|
|
#
|
|
# "cert=nickname" tells the pgo server to use a particular certificate
|
|
# for this host. The certificate is referenced by its nickname that must
|
|
# not contain any spaces. The certificate key files (PKCS12 modules)
|
|
# for custom certification are loaded from build/pgo/certs
|
|
# directory. When new certificate is added to this dir pgo/ssltunnel
|
|
# must be built then. This is only necessary for cases where we really do
|
|
# want specific certs.
|
|
#
|
|
# "redir=hostname" tells the pgo server is only used for https://
|
|
# hosts while processing the CONNECT tunnel request. It responds
|
|
# to the CONNECT with a 302 and redirection to the hostname instead
|
|
# of connecting to the real back end and replying with a 200. This
|
|
# mode exists primarily to ensure we don't allow a proxy to do that.
|
|
#
|
|
|
|
#
|
|
# This is the primary location from which tests run.
|
|
#
|
|
http://mochi.test:8888 primary,privileged
|
|
|
|
#
|
|
# These are a common set of prefixes scattered across one TLD with two ports and
|
|
# another TLD on a single port.
|
|
#
|
|
http://127.0.0.1:80 privileged
|
|
http://127.0.0.1:8888 privileged
|
|
http://test:80 privileged
|
|
http://mochi.test:8888 privileged
|
|
http://test1.mochi.test:8888
|
|
http://sub1.test1.mochi.test:8888
|
|
http://sub2.xn--lt-uia.mochi.test:8888
|
|
http://test2.mochi.test:8888
|
|
http://example.org:80 privileged
|
|
http://test1.example.org:80 privileged
|
|
http://test2.example.org:80 privileged
|
|
http://sub1.test1.example.org:80 privileged
|
|
http://sub1.test2.example.org:80 privileged
|
|
http://sub2.test1.example.org:80 privileged
|
|
http://sub2.test2.example.org:80 privileged
|
|
http://example.org:8000 privileged
|
|
http://test1.example.org:8000 privileged
|
|
http://test2.example.org:8000 privileged
|
|
http://sub1.test1.example.org:8000 privileged
|
|
http://sub1.test2.example.org:8000 privileged
|
|
http://sub2.test1.example.org:8000 privileged
|
|
http://sub2.test2.example.org:8000 privileged
|
|
http://example.com:80 privileged
|
|
http://www.example.com:80 privileged
|
|
http://test1.example.com:80 privileged
|
|
http://test2.example.com:80 privileged
|
|
http://sub1.test1.example.com:80 privileged
|
|
http://sub1.test2.example.com:80 privileged
|
|
http://sub2.test1.example.com:80 privileged
|
|
http://sub2.test2.example.com:80 privileged
|
|
http://noxul.example.com:80 privileged,noxul
|
|
http://example.net:80 privileged
|
|
# Used to test that clearing Service Workers for domain example.com, does not clear prefixexample.com
|
|
http://prefixexample.com:80
|
|
|
|
https://example.com:443 privileged
|
|
https://test1.example.com:443 privileged
|
|
https://test2.example.com:443 privileged
|
|
https://sub1.test1.example.com:443 privileged
|
|
https://sub1.test2.example.com:443 privileged
|
|
https://sub2.test1.example.com:443 privileged
|
|
https://sub2.test2.example.com:443 privileged
|
|
https://nocert.example.com:443 privileged,nocert
|
|
https://self-signed.example.com:443 privileged,cert=selfsigned
|
|
https://untrusted.example.com:443 privileged,cert=untrusted
|
|
https://expired.example.com:443 privileged,cert=expired
|
|
https://requestclientcert.example.com:443 privileged,clientauth=request
|
|
https://requireclientcert.example.com:443 privileged,clientauth=require
|
|
https://mismatch.expired.example.com:443 privileged,cert=expired
|
|
https://mismatch.untrusted.example.com:443 privileged,cert=untrusted
|
|
https://untrusted-expired.example.com:443 privileged,cert=untrustedandexpired
|
|
https://mismatch.untrusted-expired.example.com:443 privileged,cert=untrustedandexpired
|
|
|
|
# This is here so that we don't load the default live bookmark over
|
|
# the network in every test suite.
|
|
http://fxfeeds.mozilla.com:80
|
|
|
|
# Prevent safebrowsing tests from hitting the network for its-a-trap.html and
|
|
# its-an-attack.html.
|
|
http://www.itisatrap.org:80
|
|
|
|
#
|
|
# These are subdomains of <ält.example.org>.
|
|
#
|
|
http://sub1.xn--lt-uia.example.org:8000 privileged
|
|
http://sub2.xn--lt-uia.example.org:80 privileged
|
|
http://xn--exmple-cua.test:80 privileged
|
|
http://sub1.xn--exmple-cua.test:80 privileged
|
|
http://xn--exaple-kqf.test:80 privileged
|
|
http://sub1.xn--exaple-kqf.test:80 privileged
|
|
|
|
https://xn--hxajbheg2az3al.xn--jxalpdlp:443 privileged
|
|
https://sub1.xn--hxajbheg2az3al.xn--jxalpdlp:443 privileged
|
|
|
|
#
|
|
# These are subdomains of <παράδειγμα.δοκιμή>, the Greek IDN for example.test.
|
|
#
|
|
http://xn--hxajbheg2az3al.xn--jxalpdlp:80 privileged
|
|
http://sub1.xn--hxajbheg2az3al.xn--jxalpdlp:80 privileged
|
|
|
|
# Bug 413909 test host
|
|
https://bug413909.xn--hxajbheg2az3al.xn--jxalpdlp:443 privileged,cert=bug413909cert
|
|
|
|
#
|
|
# These hosts are used in tests which exercise privilege-granting functionality;
|
|
# we could reuse some of the names above, but specific names make it easier to
|
|
# distinguish one from the other in tests (as well as what functionality is
|
|
# being tested).
|
|
#
|
|
http://sectest1.example.org:80 privileged
|
|
http://sub.sectest2.example.org:80 privileged
|
|
http://sectest2.example.org:80
|
|
http://sub.sectest1.example.org:80
|
|
|
|
https://sectest1.example.org:443 privileged
|
|
https://sub.sectest2.example.org:443 privileged
|
|
https://sectest2.example.org:443
|
|
https://sub.sectest1.example.org:443
|
|
|
|
#
|
|
# Used while testing the url-classifier
|
|
#
|
|
http://malware.example.com:80
|
|
http://tracking.example.com:80
|
|
http://not-tracking.example.com:80
|
|
http://tracking.example.org:80
|
|
|
|
# Bug 483437, 484111
|
|
https://www.bank1.com:443 privileged,cert=escapeattack1
|
|
|
|
#
|
|
# CONNECT for redirproxy results in a 302 redirect to
|
|
# test1.example.com
|
|
#
|
|
https://redirproxy.example.com:443 privileged,redir=test1.example.com
|
|
|
|
# Host used for IndexedDB Quota testing
|
|
http://bug704464-1.example.com:80 privileged
|
|
http://bug704464-2.example.com:80 privileged
|
|
http://bug704464-3.example.com:80 privileged
|
|
http://bug702292.example.com:80 privileged
|
|
|
|
# W3C hosts.
|
|
# See http://www.w3.org/wiki/Testing/Requirements#The_Web_test_server_must_be_available_through_different_domain_names
|
|
http://w3c-test.org:80
|
|
http://w3c-test.org:81
|
|
http://w3c-test.org:82
|
|
http://w3c-test.org:83
|
|
http://www.w3c-test.org:80
|
|
http://www.w3c-test.org:81
|
|
http://www.w3c-test.org:82
|
|
http://www.w3c-test.org:83
|
|
http://www1.w3c-test.org:80
|
|
http://www1.w3c-test.org:81
|
|
http://www1.w3c-test.org:82
|
|
http://www1.w3c-test.org:83
|
|
http://www2.w3c-test.org:80
|
|
http://www2.w3c-test.org:81
|
|
http://www2.w3c-test.org:82
|
|
http://www2.w3c-test.org:83
|
|
# http://天気の良い日.w3c-test.org
|
|
http://xn--n8j6ds53lwwkrqhv28a.w3c-test.org:80
|
|
http://xn--n8j6ds53lwwkrqhv28a.w3c-test.org:81
|
|
http://xn--n8j6ds53lwwkrqhv28a.w3c-test.org:82
|
|
http://xn--n8j6ds53lwwkrqhv28a.w3c-test.org:83
|
|
# http://élève.w3c-test.org
|
|
http://xn--lve-6lad.w3c-test.org:80
|
|
http://xn--lve-6lad.w3c-test.org:81
|
|
http://xn--lve-6lad.w3c-test.org:82
|
|
http://xn--lve-6lad.w3c-test.org:83
|
|
# HTTPS versions of the above
|
|
https://w3c-test.org:443
|
|
https://www.w3c-test.org:443
|
|
https://www1.w3c-test.org:443
|
|
https://www2.w3c-test.org:443
|
|
https://xn--n8j6ds53lwwkrqhv28a.w3c-test.org:443
|
|
https://xn--lve-6lad.w3c-test.org:443
|
|
http://test.w3.org:80
|
|
|
|
# Hosts for testing TLD-based fallback encoding
|
|
http://example.tw:80 privileged
|
|
http://example.cn:80 privileged
|
|
http://example.co.jp:80 privileged
|
|
http://example.fi:80 privileged
|
|
|
|
# Hosts for testing marketplace apps installations
|
|
https://marketplace.firefox.com:443 privileged
|
|
https://marketplace-dev.allizom.org:443 privileged
|
|
https://marketplace.allizom.org:443 privileged
|
|
|
|
# Host for HPKP
|
|
https://include-subdomains.pinning-dynamic.example.com:443 privileged,cert=dynamicPinningGood
|
|
https://bad.include-subdomains.pinning-dynamic.example.com:443 privileged,cert=dynamicPinningBad
|
|
|
|
# Host for static pin tests
|
|
https://badchain.include-subdomains.pinning.example.com:443 privileged,cert=staticPinningBad
|
|
https://fail-handshake.example.com:443 privileged,failHandshake
|
|
|
|
# Hosts for sha1 console warning tests
|
|
https://sha1ee.example.com:443 privileged,cert=sha1_end_entity
|
|
https://sha256ee.example.com:443 privileged,cert=sha256_end_entity
|
|
|
|
# Hosts for ssl3/rc4 console warning tests
|
|
https://ssl3.example.com:443 privileged,ssl3
|
|
https://rc4.example.com:443 privileged,rc4
|
|
https://ssl3rc4.example.com:443 privileged,ssl3,rc4
|