Commit e976366e authored by kytv's avatar kytv
Browse files

Rename "GNOME has started" to better reflect our intentions

parent bd3c9b13
......@@ -12,7 +12,7 @@ Feature: Installing packages through APT
And I enable more Tails Greeter options
And I set sudo password "asdf"
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And Tor is ready
And all notifications have disappeared
And available upgrades have been checked
......
......@@ -11,7 +11,7 @@ Feature: Getting a DHCP lease without leaking too much information
And I start the computer
And the computer boots Tails
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And Tor is ready
And all notifications have disappeared
And available upgrades have been checked
......@@ -23,7 +23,7 @@ Feature: Getting a DHCP lease without leaking too much information
And I start the computer
And the computer boots Tails
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And Tor is ready
And all notifications have disappeared
And available upgrades have been checked
......
......@@ -8,7 +8,7 @@ Feature: I2P
And I start the computer
And the computer boots Tails
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And Tor is ready
And all notifications have disappeared
Then the I2P Browser desktop file is not present
......@@ -21,7 +21,7 @@ Feature: I2P
And I start the computer
And the computer boots Tails
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And Tor is ready
And I2P is running
And the I2P router console is ready
......
......@@ -32,13 +32,13 @@ Feature: Root access control enforcement
And I set sudo password "asdf"
And I log in to a new session
And Tails Greeter has dealt with the sudo password
And GNOME has started
And the Tails desktop is ready
And running a command as root with pkexec requires PolicyKit administrator privileges
Then I should be able to run a command as root with pkexec
Scenario: If no administrative password is set in Tails Greeter the live user should not be able to get administrative privileges through PolicyKit with the standard passwords.
Given I log in to a new session
And Tails Greeter has dealt with the sudo password
And GNOME has started
And the Tails desktop is ready
And running a command as root with pkexec requires PolicyKit administrator privileges
Then I should not be able to run a command as root with pkexec and the standard passwords
......@@ -9,7 +9,7 @@ Feature: Logging in via SSH
And I start the computer
And the computer boots Tails
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And Tor is ready
And available upgrades have been checked
And all notifications have disappeared
......
......@@ -278,7 +278,7 @@ Given /^Tails Greeter has dealt with the sudo password$/ do
}
end
Given /^GNOME has started$/ do
Given /^the Tails desktop is ready$/ do
next if @skip_steps_while_restoring_background
case @theme
when "windows"
......@@ -291,7 +291,7 @@ end
Then /^Tails seems to have booted normally$/ do
next if @skip_steps_while_restoring_background
step "GNOME has started"
step "the Tails desktop is ready"
end
When /^I see the 'Tor is ready' notification$/ do
......
......@@ -48,7 +48,7 @@ Feature: Time syncing
And I enable more Tails Greeter options
And I enable the specific Tor configuration option
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And I save the state so the background can be restored next scenario
Scenario: Clock with host's time in bridge mode
......
......@@ -12,7 +12,7 @@ Feature: Using Tails with Tor pluggable transports
And I enable more Tails Greeter options
And I enable the specific Tor configuration option
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And I save the state so the background can be restored next scenario
Scenario: Using bridges
......
......@@ -68,7 +68,7 @@ Feature: The Tor enforcement is effective
And I start the computer
And the computer boots Tails
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And the system DNS is using the local DNS resolver
And the network is plugged
And Tor is ready
......
......@@ -9,7 +9,7 @@ Feature: Browsing the web using the Tor Browser
And I start the computer
And the computer boots Tails
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And Tor is ready
And available upgrades have been checked
And all notifications have disappeared
......
......@@ -9,7 +9,7 @@ Feature: Cloning a Git repository
And I start the computer
And the computer boots Tails
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And Tor is ready
And available upgrades have been checked
And all notifications have disappeared
......
......@@ -10,7 +10,7 @@ Feature: Keyserver interaction with GnuPG
And I start the computer
And the computer boots Tails
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And Tor is ready
And all notifications have disappeared
And available upgrades have been checked
......
......@@ -6,7 +6,7 @@ Feature: Various checks for torified software
And I start the computer
And the computer boots Tails
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And Tor is ready
And all notifications have disappeared
And available upgrades have been checked
......
......@@ -9,7 +9,7 @@ Feature: Browsing the web using the Unsafe Browser
And I start the computer
And the computer boots Tails
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And Tor is ready
And all notifications have disappeared
And available upgrades have been checked
......
......@@ -76,7 +76,7 @@ Feature: Installing Tails to a USB drive, upgrading it, and using persistence
And the boot device has safe access rights
And I enable persistence with password "asdf"
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And all notifications have disappeared
And all persistence presets are enabled
And all persistent filesystems have safe access rights
......@@ -89,7 +89,7 @@ Feature: Installing Tails to a USB drive, upgrading it, and using persistence
And the computer reboots Tails
And I enable read-only persistence with password "asdf"
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And I start the Tor Browser in offline mode
And the Tor Browser has started in offline mode
Then the Tor Browser has a bookmark to eff.org
......@@ -143,7 +143,7 @@ Feature: Installing Tails to a USB drive, upgrading it, and using persistence
And I start the computer
When the computer boots Tails
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And all notifications have disappeared
And I create a 4 GiB disk named "old"
And I plug USB drive "old"
......
......@@ -12,7 +12,7 @@ Feature: Microsoft Windows Camouflage
And I enable more Tails Greeter options
And I enable Microsoft Windows camouflage
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And all notifications have disappeared
And I save the state so the background can be restored next scenario
......
......@@ -213,7 +213,7 @@ Beyond the obvious, after this step all steps requiring the
administrative password have access to it.
And I log in to a new session
And GNOME has started
And the Tails desktop is ready
And I have a network connection
And Tor is ready
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment