https://github.com/mozilla/gecko-dev
Raw File
Tip revision: 48b2e38a57c04ea10e8c2c84029bab10499183a3 authored by Mark Banner on 13 March 2022, 12:53:23 UTC
Bug 1759364 - Update search parameters part 2. r=mkaply a=pascalc
Tip revision: 48b2e38
server-locations.txt
#
# This Source Code Form is subject to the terms of the Mozilla Public
# License, v. 2.0. If a copy of the MPL was not distributed with this
# file, You can obtain one at http://mozilla.org/MPL/2.0/.

#
# This file defines the locations at which this HTTP server may be accessed.
# It is referred to by the following page, so if this file moves, that page must
# be modified accordingly:
#
# https://developer.mozilla.org/en/docs/Mochitest#How_do_I_test_issues_which_only_show_up_when_tests_are_run_across_domains.3F
#
# Empty lines and lines which begin with "#" are ignored and may be used for
# storing comments.  All other lines consist of an origin followed by whitespace
# and a comma-separated list of options (if indeed any options are needed).
#
# The format of an origin is, referring to RFC 2396, a scheme (either "http" or
# "https"), followed by "://", followed by a host, followed by ":", followed by
# a port number.  The colon and port number must be present even if the port
# number is the default for the protocol.
#
# Unrecognized options are ignored.  Recognized options are "primary" and
# "privileged", "nocert", "cert=some_cert_nickname", "redir=hostname" and
# "failHandshake".
#
# "primary" denotes a location which is the canonical location of
# the server; this location is the one assumed for requests which don't
# otherwise identify a particular origin (e.g. HTTP/1.0 requests).
#
# "privileged" denotes a location which should have the ability to request
# elevated privileges; the default is no privileges.
#
# "nocert" makes sense only for https:// hosts and means there is not
# any certificate automatically generated for this host.
#
# "failHandshake" causes the tls handshake to fail (by sending a client hello to
# the client).
#
# "cert=nickname" tells the pgo server to use a particular certificate
# for this host. The certificate is referenced by its nickname that must
# not contain any spaces. The certificate  key files (PKCS12 modules)
# for custom certification are loaded from build/pgo/certs
# directory. When new certificate is added to this dir pgo/ssltunnel
# must be built then. This is only necessary for cases where we really do
# want specific certs.
# You can find instructions on how to add or modify certificates at:
# https://firefox-source-docs.mozilla.org/build/buildsystem/test_certificates.html
#
# "redir=hostname" tells the pgo server is only used for https://
# hosts while processing the CONNECT tunnel request. It responds
# to the CONNECT with a 302 and redirection to the hostname instead
# of connecting to the real back end and replying with a 200. This
# mode exists primarily to ensure we don't allow a proxy to do that.
#

#
# This is the primary location from which tests run.
#
http://mochi.test:8888   primary,privileged

#
# These are a common set of prefixes scattered across one TLD with two ports and
# another TLD on a single port.
#
http://127.0.0.1:80               privileged
http://127.0.0.1:8888             privileged
http://test:80                    privileged
http://mochi.test:8888            privileged
http://mochi.xorigin-test:8888    privileged
http://test1.mochi.test:8888
http://sub1.test1.mochi.test:8888
http://sub2.xn--lt-uia.mochi.test:8888
http://test2.mochi.test:8888
http://example.org:80                privileged
http://test1.example.org:80          privileged
http://test2.example.org:80          privileged
http://test3.example.org:80          privileged
http://sub1.test1.example.org:80     privileged
http://sub1.test2.example.org:80     privileged
http://sub2.test1.example.org:80     privileged
http://sub2.test2.example.org:80     privileged
http://example.org:8000              privileged
http://test1.example.org:8000        privileged
http://test2.example.org:8000        privileged
http://sub1.test1.example.org:8000   privileged
http://sub1.test2.example.org:8000   privileged
http://sub2.test1.example.org:8000   privileged
http://sub2.test2.example.org:8000   privileged
http://example.com:80                privileged
http://www.example.com:80            privileged
http://test1.example.com:80          privileged
http://test2.example.com:80          privileged
http://sub1.test1.example.com:80     privileged
http://sub1.test2.example.com:80     privileged
http://sub2.test1.example.com:80     privileged
http://sub2.test2.example.com:80     privileged
http://noxul.example.com:80          privileged,noxul
http://example.net:80                privileged
http://supports-insecure.expired.example.com:80 privileged
# Used to test that clearing Service Workers for domain example.com, does not clear prefixexample.com
http://prefixexample.com:80

# The first HTTPS location is used to generate the Common Name (CN) value of the
# certificate's Issued To field.
https://example.com:443                privileged
https://test1.example.com:443          privileged
https://test2.example.com:443          privileged
https://example.org:443                privileged
https://test1.example.org:443          privileged
https://test2.example.org:443          privileged
https://sub1.test1.example.com:443     privileged
https://sub1.test2.example.com:443     privileged
https://sub2.test1.example.com:443     privileged
https://sub2.test2.example.com:443     privileged
https://example.net:443                privileged
https://nocert.example.com:443         privileged,nocert
https://self-signed.example.com:443    privileged,cert=selfsigned
https://untrusted.example.com:443      privileged,cert=untrusted
https://expired.example.com:443        privileged,cert=expired
https://requestclientcert.example.com:443         privileged,clientauth=request
https://requireclientcert.example.com:443         privileged,clientauth=require
https://requireclientcert-2.example.com:443         privileged,clientauth=require
https://mismatch.expired.example.com:443	privileged,cert=expired
https://mismatch.untrusted.example.com:443	privileged,cert=untrusted
https://untrusted-expired.example.com:443	privileged,cert=untrustedandexpired
https://mismatch.untrusted-expired.example.com:443	privileged,cert=untrustedandexpired
https://supports-insecure.expired.example.com:443   privileged,cert=expired
https://no-subject-alt-name.example.com:443   cert=noSubjectAltName

# Used for secure contexts on ip addresses, see bug 1616675. Note that
# 127.0.0.1 prompts ssltunnel.cpp to do special-cases, so we use .2
https://127.0.0.2:443                  privileged,ipV4Address
https://secureonly.example.com:443

# Prevent safebrowsing tests from hitting the network for its-a-trap.html and
# its-an-attack.html.
http://www.itisatrap.org:80
https://www.itisatrap.org:443

#
# These are subdomains of <ält.example.org>.
#
http://sub1.xn--lt-uia.example.org:8000   privileged
http://sub2.xn--lt-uia.example.org:80     privileged
http://xn--exmple-cua.test:80             privileged
http://sub1.xn--exmple-cua.test:80        privileged
http://xn--exaple-kqf.test:80             privileged
http://sub1.xn--exaple-kqf.test:80        privileged

https://xn--hxajbheg2az3al.xn--jxalpdlp:443        privileged
https://sub1.xn--hxajbheg2az3al.xn--jxalpdlp:443   privileged

#
# These are subdomains of <παράδειγμα.δοκιμή>, the Greek IDN for example.test.
#
http://xn--hxajbheg2az3al.xn--jxalpdlp:80        privileged
http://sub1.xn--hxajbheg2az3al.xn--jxalpdlp:80   privileged

# Bug 413909 test host
https://bug413909.xn--hxajbheg2az3al.xn--jxalpdlp:443   privileged,cert=bug413909cert

#
# These hosts are used in tests which exercise privilege-granting functionality;
# we could reuse some of the names above, but specific names make it easier to
# distinguish one from the other in tests (as well as what functionality is
# being tested).
#
http://sectest1.example.org:80       privileged
http://sub.sectest2.example.org:80   privileged
http://sectest2.example.org:80
http://sub.sectest1.example.org:80

https://sectest1.example.org:443       privileged
https://sub.sectest2.example.org:443   privileged
https://sectest2.example.org:443
https://sub.sectest1.example.org:443

#
# Used while testing the url-classifier
#
http://malware.example.com:80
http://unwanted.example.com:80
http://tracking.example.com:80
http://cryptomining.example.com:80
http://fingerprinting.example.com:80
http://not-tracking.example.com:80
http://tracking.example.org:80
http://another-tracking.example.net:80
http://social-tracking.example.org:80
http://itisatracker.org:80
https://itisatracker.org:443
http://trackertest.org:80
#
# Used while testing TLS session ticket resumption for third-party trackers (bug 1500533)
# (DO NOT USE THIS HOST IN OTHER TESTS!)
#
https://tlsresumptiontest.example.org:443

https://malware.example.com:443
https://unwanted.example.com:443
https://tracking.example.com:443
https://cryptomining.example.com:443
https://fingerprinting.example.com:443
https://not-tracking.example.com:443
https://tracking.example.org:443
https://another-tracking.example.net:443
https://social-tracking.example.org:443

#
# Used while testing flash blocking (Bug 1307604)
#
http://flashallow.example.com:80
http://exception.flashallow.example.com:80
http://flashblock.example.com:80
http://exception.flashblock.example.com:80
http://subdocument.example.com:80
https://subdocument.example.com:443
http://exception.subdocument.example.com:80

#
# Used while testing tracking protection (Bug 1580416)
# Not that apps.fbsbx.com is a public suffix
#
http://mochitest.apps.fbsbx.com:80

#
# Flash usage can fail unless this URL exists
#
http://fpdownload2.macromedia.com:80
https://fpdownload2.macromedia.com:443

# Bug 1281083
http://bug1281083.example.com:80

# Bug 483437, 484111
https://www.bank1.com:443           privileged,cert=escapeattack1

#
# CONNECT for redirproxy results in a 302 redirect to
# test1.example.com
#
https://redirproxy.example.com:443          privileged,redir=test1.example.com

# Host used for IndexedDB Quota testing
http://bug704464-1.example.com:80        privileged
http://bug704464-2.example.com:80        privileged
http://bug704464-3.example.com:80        privileged
http://bug702292.example.com:80          privileged

# W3C hosts.
# See http://www.w3.org/wiki/Testing/Requirements#The_Web_test_server_must_be_available_through_different_domain_names
http://w3c-test.org:80
http://w3c-test.org:81
http://w3c-test.org:82
http://w3c-test.org:83
http://www.w3c-test.org:80
http://www.w3c-test.org:81
http://www.w3c-test.org:82
http://www.w3c-test.org:83
http://www1.w3c-test.org:80
http://www1.w3c-test.org:81
http://www1.w3c-test.org:82
http://www1.w3c-test.org:83
http://www2.w3c-test.org:80
http://www2.w3c-test.org:81
http://www2.w3c-test.org:82
http://www2.w3c-test.org:83
# http://天気の良い日.w3c-test.org
http://xn--n8j6ds53lwwkrqhv28a.w3c-test.org:80
http://xn--n8j6ds53lwwkrqhv28a.w3c-test.org:81
http://xn--n8j6ds53lwwkrqhv28a.w3c-test.org:82
http://xn--n8j6ds53lwwkrqhv28a.w3c-test.org:83
# http://élève.w3c-test.org
http://xn--lve-6lad.w3c-test.org:80
http://xn--lve-6lad.w3c-test.org:81
http://xn--lve-6lad.w3c-test.org:82
http://xn--lve-6lad.w3c-test.org:83
# HTTPS versions of the above
https://w3c-test.org:443
https://www.w3c-test.org:443
https://www1.w3c-test.org:443
https://www2.w3c-test.org:443
https://xn--n8j6ds53lwwkrqhv28a.w3c-test.org:443
https://xn--lve-6lad.w3c-test.org:443
http://test.w3.org:80

# Hosts for testing TLD-based fallback encoding
http://example.tw:80                privileged
http://example.cn:80                privileged
http://example.co.jp:80             privileged
http://example.fi:80                privileged
http://example.in:80                privileged
http://example.lk:80                privileged

# Host for HPKP
https://include-subdomains.pinning-dynamic.example.com:443        privileged,cert=dynamicPinningGood
https://bad.include-subdomains.pinning-dynamic.example.com:443    privileged,cert=dynamicPinningBad

# Host for static pin tests
https://badchain.include-subdomains.pinning.example.com:443       privileged,cert=staticPinningBad
https://fail-handshake.example.com:443                            privileged,failHandshake

# Host for bad cert domain fixup test
https://badcertdomain.example.com:443                             privileged,cert=badCertDomain
https://www.badcertdomain.example.com:443                         privileged,cert=badCertDomain
https://127.0.0.3:433                                             privileged,cert=badCertDomain
https://badcertdomain.example.com:82                              privileged,cert=badCertDomain
https://mismatch.badcertdomain.example.com:443                    privileged,cert=badCertDomain

# Hosts for HTTPS-First upgrades/downgrades
http://httpsfirst.com:80                                          privileged
https://httpsfirst.com:443                                        privileged,nocert

# Hosts for sha1 console warning tests
https://sha1ee.example.com:443                                    privileged,cert=sha1_end_entity
https://sha256ee.example.com:443                                  privileged,cert=sha256_end_entity

# Hosts for imminent distrust warning tests
https://imminently-distrusted.example.com:443                     privileged,cert=imminently_distrusted

# Hosts for ssl3/rc4/tls1 warning tests
https://ssl3.example.com:443         privileged,ssl3
https://rc4.example.com:443          privileged,rc4
https://ssl3rc4.example.com:443      privileged,ssl3,rc4
https://tls1.example.com:443         privileged,tls1
https://tls11.example.com:443        privileged,tls1_1
https://tls12.example.com:443        privileged,tls1_2
https://tls13.example.com:443        privileged,tls1,tls1_3

# Hosts for youtube rewrite tests
https://mochitest.youtube.com:443

# Host for U2F localhost tests
https://localhost:443

# Bug 1402530
http://localhost:80                 privileged

# Host for testing APIs whitelisted for mozilla.org
https://www.mozilla.org:443

# local-IP origins for password manager tests (Bug 1582499)
http://10.0.0.0:80                 privileged
http://192.168.0.0:80              privileged

# testing HTTPS-Only Suggestions on the Error Page (Bug 1665057)
https://www.suggestion-example.com:443      privileged,cert=bug1665057cert
http://suggestion-example.com:80            privileged
https://suggestion-example.com:443          privileged,cert=badCertDomain
http://no-suggestion-example.com:80         privileged
https://no-suggestion-example.com:443       privileged,cert=badCertDomain

# testing HTTPS-First behaviour for redirection (Bug 1706126)
http://redirect-example.com:80              privileged
https://redirect-example.com:443            privileged,cert=bug1706126cert
https://www.redirect-example.com:443        privileged,cert=bug1706126cert
back to top