checks.feature 4.03 KB
Newer Older
1
@product
2
3
Feature: Various checks

4
  Scenario: AppArmor is enabled and has enforced profiles
5
    Given I have started Tails from DVD without network and logged in
6
7
8
    Then AppArmor is enabled
    And some AppArmor profiles are enforced

9
  Scenario: A screenshot is taken when the PRINTSCREEN key is pressed
10
    Given I have started Tails from DVD without network and logged in
11
    And there is no screenshot in the live user's Pictures directory
12
    When I press the "PRINTSCREEN" key
13
    Then a screenshot is saved to the live user's Pictures directory
14

15
  Scenario: VirtualBox guest modules are available
16
    Given I have started Tails from DVD without network and logged in
17
    When Tails has booted a 64-bit kernel
18
19
    Then the VirtualBox guest modules are available

20
  Scenario: The shipped Tails OpenPGP keys are up-to-date
21
    Given I have started Tails from DVD without network and logged in
22
    Then the OpenPGP keys shipped with Tails will be valid for the next 3 months
23

24
  Scenario: The Tails Debian repository key is up-to-date
25
    Given I have started Tails from DVD without network and logged in
kytv's avatar
kytv committed
26
    Then the shipped Debian repository key will be valid for the next 3 months
27

bertagaz's avatar
bertagaz committed
28
  @doc @fragile
29
  Scenario: The "Report an Error" launcher will open the support documentation
30
    Given I have started Tails from DVD without network and logged in
31
    And the network is plugged
32
33
34
    And Tor is ready
    And all notifications have disappeared
    When I double-click the Report an Error launcher on the desktop
kytv's avatar
kytv committed
35
    Then the support documentation page opens in Tor Browser
36

37
  Scenario: The live user is setup correctly
38
    Given I have started Tails from DVD without network and logged in
39
    Then the live user has been setup by live-boot
40
    And the live user is a member of only its own group and "audio cdrom dialout floppy video plugdev netdev scanner lp lpadmin vboxsf"
41
42
    And the live user owns its home dir and it has normal permissions

bertagaz's avatar
bertagaz committed
43
  @fragile
44
  Scenario: No initial network
45
    Given I have started Tails from DVD without network and logged in
46
    And I wait between 30 and 60 seconds
47
    When the network is plugged
48
    And Tor is ready
49
    And all notifications have disappeared
50
    And the time has synced
51
    And process "vidalia" is running within 30 seconds
52

bertagaz's avatar
bertagaz committed
53
  @fragile
54
  Scenario: The 'Tor is ready' notification is shown when Tor has bootstrapped
55
    Given I have started Tails from DVD without network and logged in
56
    And the network is plugged
Tails developers's avatar
Tails developers committed
57
58
    When I see the 'Tor is ready' notification
    Then Tor is ready
59

bertagaz's avatar
bertagaz committed
60
  @fragile
61
  Scenario: The tor process should be confined with Seccomp
62
    Given I have started Tails from DVD without network and logged in
63
    And the network is plugged
64
    And Tor is ready
65
    Then the running process "tor" is confined with Seccomp in filter mode
66

bertagaz's avatar
bertagaz committed
67
  @fragile
68
  Scenario: No unexpected network services
69
    Given I have started Tails from DVD without network and logged in
70
    When the network is plugged
71
    And Tor is ready
72
73
    Then no unexpected services are listening for network connections

74
  Scenario: The emergency shutdown applet can shutdown Tails
75
    Given I have started Tails from DVD without network and logged in
76
77
78
79
    When I request a shutdown using the emergency shutdown applet
    Then Tails eventually shuts down

  Scenario: The emergency shutdown applet can reboot Tails
80
    Given I have started Tails from DVD without network and logged in
81
82
    When I request a reboot using the emergency shutdown applet
    Then Tails eventually restarts
83
84
85
86

  Scenario: tails-debugging-info does not leak information
    Given I have started Tails from DVD without network and logged in
    Then tails-debugging-info is not susceptible to symlink attacks
87
88
89
90
91
92
93
94

  Scenario: The Tails Greeter "disable all networking" option disables networking within Tails
    Given I have started Tails from DVD without network and stopped at Tails Greeter's login screen
    And I enable more Tails Greeter options
    And I disable all networking in the Tails Greeter
    And I log in to a new session
    And the Tails desktop is ready
    Then no network interfaces are enabled