- 29 Jul, 2021 3 commits
- 28 Jul, 2021 1 commit
-
-
boyska authored
-
- 21 Jul, 2021 4 commits
-
-
boyska authored
We're testing that the bug exists and that setting the time fixes this.
-
boyska authored
-
boyska authored
we change the time ourselves, to simulate what TCA should have done. that's just to run the whole scenario, but clearly doesn't test anything about the actual implementation in TCA.
-
boyska authored
-
- 05 Jun, 2021 1 commit
-
- 09 Mar, 2021 1 commit
-
-
anonym authored
-
- 05 Mar, 2021 1 commit
-
-
anonym authored
Bridges can use PTs or not -- bridges are _not_ a type of PT.
-
- 22 Jan, 2021 1 commit
-
-
anonym authored
I picked a rather transparent and implicit approach, by handing the default Tor Launcher case (direct connection) right in the `Tor is ready` step. This might be a bit opaque and confusing, however, but otherwise, in all scenarios/snapshots where we have: And the network is plugged ... Then Tor is ready we would have to add steps: And the network is plugged ... And the Tor Launcher autostarts When I configure a direct connection in Tor Launcher Then Tor is ready which is a bit spammy. I suppose it could be compressed into: And the network is plugged ... Then Tor is ready after I choose a direct connection in Tor Launcher but I don't like that kind of formulations in Gherkin.
-
- 23 Apr, 2020 1 commit
-
-
intrigeri authored
Scenario names are supposed to concisely describe the desired behavior of the system under test, rather than the steps required to perform the actual tests.
-
- 11 Jul, 2019 2 commits
-
-
emmapeel authored
Currently translated at 17.7% (11 of 62 strings) Translation: Tails/wiki/src/news/version_3.14.1.*.po Translate-URL: http://translate.tails.boum.org/projects/tails/wikisrcnewsversion_3141po/pt/
-
emmapeel authored
Currently translated at 39.0% (16 of 41 strings) Translation: Tails/wiki/src/news/version_3.11.*.po Translate-URL: http://translate.tails.boum.org/projects/tails/wikisrcnewsversion_311po/it/
-
- 17 Nov, 2018 1 commit
-
-
intrigeri authored
Let's verify whether our time sync'ing mechanism still works even without the hack that temporarily increases tor's log level in bridge mode.
-
- 22 May, 2017 1 commit
-
-
intrigeri authored
-
- 15 Mar, 2017 1 commit
-
- 22 Jul, 2016 1 commit
-
- 14 May, 2016 2 commits
-
-
anonym authored
- 20 Apr, 2016 1 commit
-
-
anonym authored
We don't need to be fancy about the case any more.
-
- 20 Feb, 2016 1 commit
-
- 07 Dec, 2015 1 commit
-
- 28 Oct, 2015 1 commit
-
-
kytv authored
-
- 06 Oct, 2015 2 commits
- 02 Oct, 2015 2 commits
-
-
anonym authored
For users that keep their Tails up-to-date it's very reasonable that their Tails release date can be ~six weeks ago. Since Tails will set the clock to the release date if it detects a time earlier than that, we should test at least this case.
-
anonym authored
There's little reason for keeping them separate, especially when time_syncing.feature can't have a background any way (due to the hardware clock scenarios) which otherwise might have been a tiny motivation.
-
- 28 Jun, 2015 1 commit
-
-
kytv authored
-
- 27 Jun, 2015 2 commits
- 15 May, 2015 2 commits
- 12 May, 2015 2 commits
-
-
anonym authored
Thanks to config/chroot_local-includes/lib/live/config/0001-sane-clock these scenarios cannot happen, and since we test that it works they can be safely removed.
-
- 05 May, 2015 1 commit
-
-
kytv authored
-
- 19 Feb, 2015 1 commit
-
-
Tails developers authored
-
- 03 Feb, 2015 1 commit
-
-
Tails developers authored
-
- 03 Oct, 2014 1 commit
-
-
Tails developers authored
Factorize common pattern into a single "I start Tails from DVD with network unplugged and I login" step.
-