build/pgo/server-locations.txt
author Gregory Szorc <gps@mozilla.com>
Wed, 28 Jan 2015 13:37:00 -0800
branchCAL130_20120427_RELBRANCH
changeset 120182 cbd207860d1f832b35e33fa58b1ce86329eada6f
parent 86180 e6fb800eb24a19a3b3e300666b402a6cee3f54a6
child 98529 f4157e8c410708d76703f19e4dfb61859bfe32d8
permissions -rw-r--r--
Close old release branch CAL130_20120427_RELBRANCH

#
# ***** BEGIN LICENSE BLOCK *****
# Version: MPL 1.1/GPL 2.0/LGPL 2.1
#
# The contents of this file are subject to the Mozilla Public License Version
# 1.1 (the "License"); you may not use this file except in compliance with
# the License. You may obtain a copy of the License at
# http://www.mozilla.org/MPL/
#
# Software distributed under the License is distributed on an "AS IS" basis,
# WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
# for the specific language governing rights and limitations under the
# License.
#
# The Original Code is mozilla.org code.
#
# The Initial Developer of the Original Code is
# Jeff Walden <jwalden+code@mit.edu>.
# Portions created by the Initial Developer are Copyright (C) 2008
# the Initial Developer. All Rights Reserved.
#
# Contributor(s):
#
# Alternatively, the contents of this file may be used under the terms of
# either the GNU General Public License Version 2 or later (the "GPL"), or
# the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
# in which case the provisions of the GPL or the LGPL are applicable instead
# of those above. If you wish to allow use of your version of this file only
# under the terms of either the GPL or the LGPL, and not to allow others to
# use your version of this file under the terms of the MPL, indicate your
# decision by deleting the provisions above and replace them with the notice
# and other provisions required by the GPL or the LGPL. If you do not delete
# the provisions above, a recipient may use your version of this file under
# the terms of any one of the MPL, the GPL or the LGPL.
#
# ***** END LICENSE BLOCK *****

#
# This file defines the locations at which this HTTP server may be accessed.
# It is referred to by the following page, so if this file moves, that page must
# be modified accordingly:
#
# http://developer.mozilla.org/en/docs/Mochitest#How_do_I_test_issues_which_only_show_up_when_tests_are_run_across_domains.3F
#
# Empty lines and lines which begin with "#" are ignored and may be used for
# storing comments.  All other lines consist of an origin followed by whitespace
# and a comma-separated list of options (if indeed any options are needed).
#
# The format of an origin is, referring to RFC 2396, a scheme (either "http" or
# "https"), followed by "://", followed by a host, followed by ":", followed by
# a port number.  The colon and port number must be present even if the port
# number is the default for the protocol.
#
# Unrecognized options are ignored.  Recognized options are "primary" and
# "privileged", "nocert", "cert=some_cert_nickname", "redir=hostname".
#
# "primary" denotes a location which is the canonical location of
# the server; this location is the one assumed for requests which don't
# otherwise identify a particular origin (e.g. HTTP/1.0 requests).  
#
# "privileged" denotes a location which should have the ability to request 
# elevated privileges; the default is no privileges.
#
# "nocert" makes sense only for https:// hosts and means there is not
# any certificate automatically generated for this host.
#
# "cert=nickname" tells the pgo server to use a particular certificate
# for this host. The certificate is referenced by its nickname that must
# not contain any spaces. The certificate  key files (PKCS12 modules)
# for custom certification are loaded from build/pgo/ssltunnel/certs
# directory. When new certificate is added to this dir pgo/ssltunnel
# must be builded then.
#
# "redir=hostname" tells the pgo server is only used for https://
# hosts while processing the CONNECT tunnel request. It responds
# to the CONNECT with a 302 and redirection to the hostname instead
# of connecting to the real back end and replying with a 200. This
# mode exists primarily to ensure we don't allow a proxy to do that.
#

#
# This is the primary location from which tests run.
#
http://mochi.test:8888   primary,privileged

#
# These are a common set of prefixes scattered across one TLD with two ports and
# another TLD on a single port.
#
http://127.0.0.1:80               privileged
http://127.0.0.1:8888             privileged
http://test:80                    privileged
http://mochi.test:8888            privileged
http://example.org:80                privileged
http://test1.example.org:80          privileged
http://test2.example.org:80          privileged
http://sub1.test1.example.org:80     privileged
http://sub1.test2.example.org:80     privileged
http://sub2.test1.example.org:80     privileged
http://sub2.test2.example.org:80     privileged
http://example.org:8000              privileged
http://test1.example.org:8000        privileged
http://test2.example.org:8000        privileged
http://sub1.test1.example.org:8000   privileged
http://sub1.test2.example.org:8000   privileged
http://sub2.test1.example.org:8000   privileged
http://sub2.test2.example.org:8000   privileged
http://example.com:80                privileged
http://www.example.com:80            privileged
http://test1.example.com:80          privileged
http://test2.example.com:80          privileged
http://sub1.test1.example.com:80     privileged
http://sub1.test2.example.com:80     privileged
http://sub2.test1.example.com:80     privileged
http://sub2.test2.example.com:80     privileged
http://noxul.example.com:80          privileged,noxul

https://example.com:443                privileged
https://test1.example.com:443          privileged
https://test2.example.com:443          privileged
https://sub1.test1.example.com:443     privileged
https://sub1.test2.example.com:443     privileged
https://sub2.test1.example.com:443     privileged
https://sub2.test2.example.com:443     privileged
https://nocert.example.com:443         privileged,nocert
https://self-signed.example.com:443    privileged,cert=selfsigned
https://untrusted.example.com:443      privileged,cert=untrusted
https://expired.example.com:443        privileged,cert=expired
https://requestclientcert.example.com:443         privileged,clientauth=request
https://requireclientcert.example.com:443         privileged,clientauth=require

# This is here so that we don't load the default live bookmark over
# the network in every test suite.
http://fxfeeds.mozilla.com:80

# Prevent safebrowsing tests from hitting the network for its-a-trap.html and
# its-an-attack.html.
http://www.mozilla.org:80

#
# These are subdomains of <ält.example.org>.
#
http://sub1.xn--lt-uia.example.org:8000   privileged
http://sub2.xn--lt-uia.example.org:80     privileged
http://xn--exmple-cua.test:80             privileged
http://sub1.xn--exmple-cua.test:80        privileged

https://xn--hxajbheg2az3al.xn--jxalpdlp:443        privileged
https://sub1.xn--hxajbheg2az3al.xn--jxalpdlp:443   privileged

#
# These are subdomains of <παράδειγμα.δοκιμή>, the Greek IDN for example.test.
#
http://xn--hxajbheg2az3al.xn--jxalpdlp:80        privileged
http://sub1.xn--hxajbheg2az3al.xn--jxalpdlp:80   privileged

# Bug 413909 test host
https://bug413909.xn--hxajbheg2az3al.xn--jxalpdlp:443   privileged,cert=bug413909cert

#
# These hosts are used in tests which exercise privilege-granting functionality;
# we could reuse some of the names above, but specific names make it easier to
# distinguish one from the other in tests (as well as what functionality is
# being tested).
#
http://sectest1.example.org:80       privileged
http://sub.sectest2.example.org:80   privileged
http://sectest2.example.org:80
http://sub.sectest1.example.org:80

https://sectest1.example.org:443       privileged
https://sub.sectest2.example.org:443   privileged
https://sectest2.example.org:443
https://sub.sectest1.example.org:443

#
# Used while testing the url-classifier
#
http://malware.example.com:80

# Bug 483437, 484111
https://www.bank1.com:443           privileged,cert=escapeattack1
https://www.bank2.com:443           privileged,cert=escapeattack2

#
# CONNECT for redirproxy results in a 302 redirect to
# test1.example.com
#
https://redirproxy.example.com:443          privileged,redir=test1.example.com

# Host used for IndexedDB Quota testing
http://bug704464-1.example.com:80        privileged
http://bug704464-2.example.com:80        privileged
http://bug704464-3.example.com:80        privileged
http://bug702292.example.com:80          privileged