unsafe_browser.rb 8.51 KB
Newer Older
1
When /^I see and accept the Unsafe Browser start verification$/ do
kytv's avatar
kytv committed
2
  @screen.wait('GnomeQuestionDialogIcon.png', 30)
3 4 5
  @screen.type(Sikuli::Key.ESC)
end

6
def supported_torbrowser_languages
7 8 9 10 11 12 13 14
  localization_descriptions = "#{Dir.pwd}/config/chroot_local-includes/usr/share/tails/browser-localization/descriptions"
  File.read(localization_descriptions).split("\n").map do |line|
    # The line will be of the form "xx:YY:..." or "xx-YY:YY:..."
    first, second = line.sub('-', '_').split(':')
    candidates = ["#{first}_#{second}.utf8", "#{first}.utf8",
                  "#{first}_#{second}", first]
    when_not_found = Proc.new { raise "Could not find a locale for '#{line}'" }
    candidates.find(when_not_found) do |candidate|
15
      $vm.directory_exist?("/usr/lib/locale/#{candidate}")
16
    end
17 18 19
  end
end

20
Then /^I start the Unsafe Browser in the "([^"]+)" locale$/ do |loc|
21
  step "I run \"LANG=#{loc} LC_ALL=#{loc} sudo unsafe-browser\" in GNOME Terminal"
22
  step "I see and accept the Unsafe Browser start verification"
23 24
end

25
Then /^the Unsafe Browser works in all supported languages$/ do
26
  failed = Array.new
kytv's avatar
kytv committed
27
  supported_torbrowser_languages.each do |lang|
28
    step "I start the Unsafe Browser in the \"#{lang}\" locale"
29 30 31 32 33 34
    begin
      step "the Unsafe Browser has started"
    rescue RuntimeError
      failed << lang
      next
    end
35 36 37
    step "I close the Unsafe Browser"
    step "the Unsafe Browser chroot is torn down"
  end
38
  assert(failed.empty?, "Unsafe Browser failed to launch in the following locale(s): #{failed.join(', ')}")
39 40
end

41
Then /^I see the Unsafe Browser start notification and wait for it to close$/ do
42
  notification_helper('UnsafeBrowserStartNotification.png', 30)
43 44 45
  @screen.waitVanish("UnsafeBrowserStartNotification.png", 10)
end

46
Then /^the Unsafe Browser has started$/ do
47
  @screen.wait("UnsafeBrowserHomepage.png", 360)
48 49
end

50
Then /^the Unsafe Browser has no add-ons installed$/ do
51 52
  step "I open the address \"about:addons\" in the Unsafe Browser"
  step "I see \"UnsafeBrowserNoAddons.png\" after at most 30 seconds"
53 54
end

55 56 57 58 59 60 61 62 63 64
Then /^the Unsafe Browser has only Firefox's default bookmarks configured$/ do
  info = xul_application_info("Unsafe Browser")
  # "Show all bookmarks"
  @screen.type("o", Sikuli::KeyModifier.SHIFT + Sikuli::KeyModifier.CTRL)
  @screen.wait_and_click("UnsafeBrowserExportBookmarksButton.png", 20)
  @screen.wait_and_click("UnsafeBrowserExportBookmarksMenuEntry.png", 20)
  @screen.wait("UnsafeBrowserExportBookmarksSavePrompt.png", 20)
  path = "/home/#{info[:user]}/bookmarks"
  @screen.type(path + Sikuli::Key.ENTER)
  chroot_path = "#{info[:chroot]}/#{path}.json"
65 66
  try_for(10) { $vm.file_exist?(chroot_path) }
  dump = JSON.load($vm.file_content(chroot_path))
67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102

  def check_bookmarks_helper(a)
    mozilla_uris_counter = 0
    places_uris_counter = 0
    a.each do |h|
      h.each_pair do |k, v|
        if k == "children"
          m, p = check_bookmarks_helper(v)
          mozilla_uris_counter += m
          places_uris_counter += p
        elsif k == "uri"
          uri = v
          if uri.match("^https://www\.mozilla\.org/")
            mozilla_uris_counter += 1
          elsif uri.match("^place:(sort|folder|type)=")
            places_uris_counter += 1
          else
            raise "Unexpected Unsafe Browser bookmark for '#{uri}'"
          end
        end
      end
    end
    return [mozilla_uris_counter, places_uris_counter]
  end

  mozilla_uris_counter, places_uris_counter =
    check_bookmarks_helper(dump["children"])
  assert_equal(5, mozilla_uris_counter,
               "Unexpected number (#{mozilla_uris_counter}) of mozilla " \
               "bookmarks")
  assert_equal(3, places_uris_counter,
               "Unexpected number (#{places_uris_counter}) of places " \
               "bookmarks")
  @screen.type(Sikuli::Key.F4, Sikuli::KeyModifier.ALT)
end

103 104 105 106 107 108 109 110 111
Then /^the Unsafe Browser has a red theme$/ do
  @screen.wait("UnsafeBrowserRedTheme.png", 10)
end

Then /^the Unsafe Browser shows a warning as its start page$/ do
  @screen.wait("UnsafeBrowserStartPage.png", 10)
end

When /^I start the Unsafe Browser$/ do
112
  step 'I start "UnsafeBrowser" via the GNOME "Internet" applications menu'
113 114 115 116
end

When /^I successfully start the Unsafe Browser$/ do
  step "I start the Unsafe Browser"
117
  step "I see and accept the Unsafe Browser start verification"
118
  step "I see the Unsafe Browser start notification and wait for it to close"
119
  step "the Unsafe Browser has started"
120 121 122 123 124 125
end

Then /^I see a warning about another instance already running$/ do
  @screen.wait('UnsafeBrowserWarnAlreadyRunning.png', 10)
end

Tails developers's avatar
Tails developers committed
126
When /^I close the Unsafe Browser$/ do
127
  @screen.type("q", Sikuli::KeyModifier.CTRL)
128 129
end

130
Then /^I see the Unsafe Browser stop notification$/ do
131
  notification_helper('UnsafeBrowserStopNotification.png', 20)
132 133 134
  @screen.waitVanish('UnsafeBrowserStopNotification.png', 10)
end

135 136 137 138
Then /^I can start the Unsafe Browser again$/ do
  step "I start the Unsafe Browser"
end

139 140 141
Then /^I cannot configure the Unsafe Browser to use any local proxies$/ do
  socks_proxy = 'c' # Alt+c for socks proxy
  no_proxy    = 'y' # Alt+y for no proxy
142 143
  proxies = [[no_proxy, nil, nil]]
  socksport_lines =
144
    $vm.execute_successfully('grep -w "^SocksPort" /etc/tor/torrc').stdout
145 146 147 148 149
  assert(socksport_lines.size >= 4, "We got fewer than four Tor SocksPorts")
  socksports = socksport_lines.scan(/^SocksPort\s([^:]+):(\d+)/)
  proxies += socksports.map { |host, port| [socks_proxy, host, port] }

  proxies.each do |proxy_type, proxy_host, proxy_port|
150 151
    @screen.hide_cursor

152
    # Open proxy settings and select manual proxy configuration
153 154
    @screen.click('UnsafeBrowserMenuButton.png')
    @screen.wait_and_click('UnsafeBrowserPreferencesButton.png', 10)
155 156 157 158 159
    @screen.wait_and_click('UnsafeBrowserAdvancedSettingsButton.png', 10)
    hit, _ = @screen.waitAny(['UnsafeBrowserNetworkTabAlreadySelected.png',
                              'UnsafeBrowserNetworkTab.png'], 10)
    @screen.click(hit) if hit == 'UnsafeBrowserNetworkTab.png'
    @screen.wait_and_click('UnsafeBrowserNetworkTabSettingsButton.png', 10)
160
    @screen.wait_and_click('UnsafeBrowserProxySettingsWindow.png', 10)
161
    @screen.type("m", Sikuli::KeyModifier.ALT)
162 163

    # Configure the proxy
164
    @screen.type(proxy_type, Sikuli::KeyModifier.ALT)  # Select correct proxy type
165
    @screen.type(proxy_host + Sikuli::Key.TAB + proxy_port) if proxy_type != no_proxy
166

Tails developers's avatar
Tails developers committed
167
    # Close settings
168
    @screen.type(Sikuli::Key.ENTER)
anonym's avatar
anonym committed
169
    @screen.waitVanish('UnsafeBrowserProxySettingsWindow.png', 10)
170 171 172 173 174 175 176 177 178 179

    # Test that the proxy settings work as they should
    step "I open the address \"https://check.torproject.org\" in the Unsafe Browser"
    if proxy_type == no_proxy
      @screen.wait('UnsafeBrowserTorCheckFail.png', 60)
    else
      @screen.wait('UnsafeBrowserProxyRefused.png', 60)
    end
  end
end
180

181 182 183
Then /^the Unsafe Browser has no proxy configured$/ do
  @screen.click('UnsafeBrowserMenuButton.png')
  @screen.wait_and_click('UnsafeBrowserPreferencesButton.png', 10)
184
  @screen.wait_and_click('UnsafeBrowserAdvancedSettingsButton.png', 10)
185
  @screen.wait_and_click('UnsafeBrowserNetworkTab.png', 10)
anonym's avatar
anonym committed
186
  @screen.wait_and_click('UnsafeBrowserNetworkTabSettingsButton.png', 10)
anonym's avatar
anonym committed
187
  @screen.wait('UnsafeBrowserProxySettingsWindow.png', 10)
188 189
  @screen.wait('UnsafeBrowserNoProxySelected.png', 10)
  @screen.type(Sikuli::Key.F4, Sikuli::KeyModifier.ALT)
190
  @screen.type("w", Sikuli::KeyModifier.CTRL)
191 192
end

193 194 195
Then /^the Unsafe Browser complains that no DNS server is configured$/ do
  @screen.wait("UnsafeBrowserDNSError.png", 30)
end
196 197 198

Then /^I configure the Unsafe Browser to check for updates more frequently$/ do
  prefs = '/usr/share/tails/unsafe-browser/prefs.js'
199 200 201
  $vm.file_append(prefs, 'pref("app.update.idletime", 1);')
  $vm.file_append(prefs, 'pref("app.update.promptWaitTime", 1);')
  $vm.file_append(prefs, 'pref("app.update.interval", 5);')
202
end
203 204 205

But /^checking for updates is disabled in the Unsafe Browser's configuration$/ do
  prefs = '/usr/share/tails/unsafe-browser/prefs.js'
206
  assert($vm.file_content(prefs).include?('pref("app.update.enabled", false)'))
207
end
208 209 210

Then /^the clearnet user has (|not )sent packets out to the Internet$/ do |sent|
  pkts = 0
211 212
  uid = $vm.execute_successfully("id -u clearnet").stdout.chomp.to_i
  iptables_output = $vm.execute_successfully("iptables -vnL").stdout.chomp
213 214
  output_chain = iptables_parse(iptables_output)["OUTPUT"]
  output_chain["rules"].each do |rule|
Tails developers's avatar
Tails developers committed
215
    if /owner UID match \b#{uid}\b/.match(rule["extra"])
216
      pkts += rule["pkts"]
217 218 219 220 221 222 223 224 225 226
    end
  end

  case sent
  when ''
    assert(pkts > 0, "Packets have not gone out to the internet.")
  when 'not'
    assert_equal(pkts, 0, "Packets have gone out to the internet.")
  end
end