unsafe_browser.rb 7.54 KB
Newer Older
1
When /^I see and accept the Unsafe Browser start verification$/ do
kytv's avatar
kytv committed
2
  @screen.wait('GnomeQuestionDialogIcon.png', 30)
3 4 5
  @screen.type(Sikuli::Key.ESC)
end

6
def supported_torbrowser_languages
7 8 9 10 11 12 13 14
  localization_descriptions = "#{Dir.pwd}/config/chroot_local-includes/usr/share/tails/browser-localization/descriptions"
  File.read(localization_descriptions).split("\n").map do |line|
    # The line will be of the form "xx:YY:..." or "xx-YY:YY:..."
    first, second = line.sub('-', '_').split(':')
    candidates = ["#{first}_#{second}.utf8", "#{first}.utf8",
                  "#{first}_#{second}", first]
    when_not_found = Proc.new { raise "Could not find a locale for '#{line}'" }
    candidates.find(when_not_found) do |candidate|
15
      $vm.directory_exist?("/usr/lib/locale/#{candidate}")
16
    end
17 18 19
  end
end

20
Then /^I start the Unsafe Browser in the "([^"]+)" locale$/ do |loc|
21
  step "I run \"LANG=#{loc} LC_ALL=#{loc} sudo unsafe-browser\" in GNOME Terminal"
22
  step "I see and accept the Unsafe Browser start verification"
23 24
end

25
Then /^the Unsafe Browser works in all supported languages$/ do
26
  failed = Array.new
kytv's avatar
kytv committed
27
  supported_torbrowser_languages.each do |lang|
28
    step "I start the Unsafe Browser in the \"#{lang}\" locale"
29 30 31 32 33 34
    begin
      step "the Unsafe Browser has started"
    rescue RuntimeError
      failed << lang
      next
    end
35 36 37
    step "I close the Unsafe Browser"
    step "the Unsafe Browser chroot is torn down"
  end
38
  assert(failed.empty?, "Unsafe Browser failed to launch in the following locale(s): #{failed.join(', ')}")
39 40
end

41
Then /^the Unsafe Browser has no add-ons installed$/ do
42 43
  step "I open the address \"about:addons\" in the Unsafe Browser"
  step "I see \"UnsafeBrowserNoAddons.png\" after at most 30 seconds"
44 45
end

46 47 48 49 50 51 52 53 54 55
Then /^the Unsafe Browser has only Firefox's default bookmarks configured$/ do
  info = xul_application_info("Unsafe Browser")
  # "Show all bookmarks"
  @screen.type("o", Sikuli::KeyModifier.SHIFT + Sikuli::KeyModifier.CTRL)
  @screen.wait_and_click("UnsafeBrowserExportBookmarksButton.png", 20)
  @screen.wait_and_click("UnsafeBrowserExportBookmarksMenuEntry.png", 20)
  @screen.wait("UnsafeBrowserExportBookmarksSavePrompt.png", 20)
  path = "/home/#{info[:user]}/bookmarks"
  @screen.type(path + Sikuli::Key.ENTER)
  chroot_path = "#{info[:chroot]}/#{path}.json"
56 57
  try_for(10) { $vm.file_exist?(chroot_path) }
  dump = JSON.load($vm.file_content(chroot_path))
58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93

  def check_bookmarks_helper(a)
    mozilla_uris_counter = 0
    places_uris_counter = 0
    a.each do |h|
      h.each_pair do |k, v|
        if k == "children"
          m, p = check_bookmarks_helper(v)
          mozilla_uris_counter += m
          places_uris_counter += p
        elsif k == "uri"
          uri = v
          if uri.match("^https://www\.mozilla\.org/")
            mozilla_uris_counter += 1
          elsif uri.match("^place:(sort|folder|type)=")
            places_uris_counter += 1
          else
            raise "Unexpected Unsafe Browser bookmark for '#{uri}'"
          end
        end
      end
    end
    return [mozilla_uris_counter, places_uris_counter]
  end

  mozilla_uris_counter, places_uris_counter =
    check_bookmarks_helper(dump["children"])
  assert_equal(5, mozilla_uris_counter,
               "Unexpected number (#{mozilla_uris_counter}) of mozilla " \
               "bookmarks")
  assert_equal(3, places_uris_counter,
               "Unexpected number (#{places_uris_counter}) of places " \
               "bookmarks")
  @screen.type(Sikuli::Key.F4, Sikuli::KeyModifier.ALT)
end

94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109
Then /^the Unsafe Browser has a red theme$/ do
  @screen.wait("UnsafeBrowserRedTheme.png", 10)
end

Then /^the Unsafe Browser shows a warning as its start page$/ do
  @screen.wait("UnsafeBrowserStartPage.png", 10)
end

Then /^I see a warning about another instance already running$/ do
  @screen.wait('UnsafeBrowserWarnAlreadyRunning.png', 10)
end

Then /^I can start the Unsafe Browser again$/ do
  step "I start the Unsafe Browser"
end

110 111 112
Then /^I cannot configure the Unsafe Browser to use any local proxies$/ do
  socks_proxy = 'c' # Alt+c for socks proxy
  no_proxy    = 'y' # Alt+y for no proxy
113 114
  proxies = [[no_proxy, nil, nil]]
  socksport_lines =
115
    $vm.execute_successfully('grep -w "^SocksPort" /etc/tor/torrc').stdout
116 117 118 119 120
  assert(socksport_lines.size >= 4, "We got fewer than four Tor SocksPorts")
  socksports = socksport_lines.scan(/^SocksPort\s([^:]+):(\d+)/)
  proxies += socksports.map { |host, port| [socks_proxy, host, port] }

  proxies.each do |proxy_type, proxy_host, proxy_port|
121 122
    @screen.hide_cursor

123
    # Open proxy settings and select manual proxy configuration
124 125
    @screen.click('UnsafeBrowserMenuButton.png')
    @screen.wait_and_click('UnsafeBrowserPreferencesButton.png', 10)
126 127 128 129 130
    @screen.wait_and_click('UnsafeBrowserAdvancedSettingsButton.png', 10)
    hit, _ = @screen.waitAny(['UnsafeBrowserNetworkTabAlreadySelected.png',
                              'UnsafeBrowserNetworkTab.png'], 10)
    @screen.click(hit) if hit == 'UnsafeBrowserNetworkTab.png'
    @screen.wait_and_click('UnsafeBrowserNetworkTabSettingsButton.png', 10)
131
    @screen.wait('UnsafeBrowserProxySettingsWindow.png', 10)
132
    @screen.type("m", Sikuli::KeyModifier.ALT)
133 134

    # Configure the proxy
135
    @screen.type(proxy_type, Sikuli::KeyModifier.ALT)  # Select correct proxy type
136
    @screen.type(proxy_host + Sikuli::Key.TAB + proxy_port) if proxy_type != no_proxy
137

Tails developers's avatar
Tails developers committed
138
    # Close settings
139
    @screen.type(Sikuli::Key.ENTER)
anonym's avatar
anonym committed
140
    @screen.waitVanish('UnsafeBrowserProxySettingsWindow.png', 10)
141 142 143 144 145 146 147 148 149 150

    # Test that the proxy settings work as they should
    step "I open the address \"https://check.torproject.org\" in the Unsafe Browser"
    if proxy_type == no_proxy
      @screen.wait('UnsafeBrowserTorCheckFail.png', 60)
    else
      @screen.wait('UnsafeBrowserProxyRefused.png', 60)
    end
  end
end
151

152 153 154
Then /^the Unsafe Browser has no proxy configured$/ do
  @screen.click('UnsafeBrowserMenuButton.png')
  @screen.wait_and_click('UnsafeBrowserPreferencesButton.png', 10)
155
  @screen.wait_and_click('UnsafeBrowserAdvancedSettingsButton.png', 10)
156
  @screen.wait_and_click('UnsafeBrowserNetworkTab.png', 10)
anonym's avatar
anonym committed
157
  @screen.wait_and_click('UnsafeBrowserNetworkTabSettingsButton.png', 10)
anonym's avatar
anonym committed
158
  @screen.wait('UnsafeBrowserProxySettingsWindow.png', 10)
159 160
  @screen.wait('UnsafeBrowserNoProxySelected.png', 10)
  @screen.type(Sikuli::Key.F4, Sikuli::KeyModifier.ALT)
161
  @screen.type("w", Sikuli::KeyModifier.CTRL)
162 163
end

164 165 166
Then /^the Unsafe Browser complains that no DNS server is configured$/ do
  @screen.wait("UnsafeBrowserDNSError.png", 30)
end
167 168 169

Then /^I configure the Unsafe Browser to check for updates more frequently$/ do
  prefs = '/usr/share/tails/unsafe-browser/prefs.js'
170 171 172
  $vm.file_append(prefs, 'pref("app.update.idletime", 1);')
  $vm.file_append(prefs, 'pref("app.update.promptWaitTime", 1);')
  $vm.file_append(prefs, 'pref("app.update.interval", 5);')
173
end
174 175 176

But /^checking for updates is disabled in the Unsafe Browser's configuration$/ do
  prefs = '/usr/share/tails/unsafe-browser/prefs.js'
177
  assert($vm.file_content(prefs).include?('pref("app.update.enabled", false)'))
178
end
179 180 181

Then /^the clearnet user has (|not )sent packets out to the Internet$/ do |sent|
  pkts = 0
182 183
  uid = $vm.execute_successfully("id -u clearnet").stdout.chomp.to_i
  iptables_output = $vm.execute_successfully("iptables -vnL").stdout.chomp
184 185
  output_chain = iptables_parse(iptables_output)["OUTPUT"]
  output_chain["rules"].each do |rule|
Tails developers's avatar
Tails developers committed
186
    if /owner UID match \b#{uid}\b/.match(rule["extra"])
187
      pkts += rule["pkts"]
188 189 190 191 192 193 194 195 196 197
    end
  end

  case sent
  when ''
    assert(pkts > 0, "Packets have not gone out to the internet.")
  when 'not'
    assert_equal(pkts, 0, "Packets have gone out to the internet.")
  end
end