1. 07 Dec, 2015 1 commit
  2. 03 Dec, 2015 1 commit
  3. 15 Oct, 2015 2 commits
  4. 06 Oct, 2015 1 commit
    • anonym's avatar
      Improve names of generated snapshot restoring steps. · 83bde0f9
      anonym authored
      Essentially I did:
      
          sed -i 's/Tails has booted/I have started Tails/' -- \
              features/*.feature features/step_definitions/snapshots.rb
      
      (although there was a false positive that I had to restore)
      83bde0f9
  5. 02 Oct, 2015 1 commit
  6. 14 Aug, 2015 1 commit
  7. 13 Aug, 2015 1 commit
  8. 08 Aug, 2015 2 commits
    • intrigeri's avatar
      Test suite: bump timeout. · ef20dc4e
      intrigeri authored
      ef20dc4e
    • anonym's avatar
      Rework how we test AppArmor denials. · 5cb5daf4
      anonym authored
      The basic idea is to first run a "I start monitoring the AppArmor log"
      step, which records the current time, and that any "AppArmor has
      denied" step run for the same profile later will only look at entries
      from that time and on. The wordings on the steps now make the
      scenarios a bit clearer, and we also don't have to clear syslog any
      more as an ugly workaround.
      
      Furthermore, this will bring us close to a clean solution of #9924,
      which will require us to run a sysctl command *before* anything that
      could generate the AppArmor log entries we're interested in. The "I
      monitor" step is a perfect candidate for that, wereas we before would
      need yet another step.
      5cb5daf4
  9. 05 Aug, 2015 6 commits
  10. 04 Aug, 2015 1 commit
  11. 11 Jul, 2015 1 commit
  12. 02 Jul, 2015 1 commit
  13. 29 Jun, 2015 1 commit
    • anonym's avatar
      Directly verify apparmor blocking of the Tor Browser. · 36cb0492
      anonym authored
      ... by looking in the audit log. This way we actually know that
      apparmor denied the operation, and so we don't get false positives of
      some classes of errors (e.g. the file simply has wrong permission or
      similar).
      
      Since we migrated to a browser based on Firefox esr38 we no longer get
      any graphical feedback for the apparmor blocking, which is the actual
      reason for implementing this.
      36cb0492
  14. 03 Jun, 2015 4 commits
  15. 28 May, 2015 2 commits
  16. 27 May, 2015 1 commit
  17. 15 May, 2015 2 commits
  18. 14 May, 2015 1 commit
  19. 05 May, 2015 1 commit
  20. 10 Apr, 2015 2 commits
    • anonym's avatar
      Actually run a web server on the LAN. · 709c9c75
      anonym authored
      It shouldn't be needed for the Tor Browser test since we check the
      network traffic, but we'll need it when testing the Unsafe Browser, so
      why not?
      709c9c75
    • anonym's avatar
      Test that the Tor Browser cannot access LAN resources. · 1d27515e
      anonym authored
      Since no HTTP server is listening on the LAN resource the Tor Browser
      would show the same "Unable to connect" error message even if the
      request wasn't blocked. We should be fine, though, since we check the
      captured traffic. The picture is more of a signal saying that "now the
      network traffic would have been generated *if* the request isn't
      blocked" which we use to know when to check the network capture.
      1d27515e
  21. 18 Feb, 2015 1 commit
  22. 12 Feb, 2015 1 commit
    • Tails developers's avatar
      Reorder steps to avoid lost key presses. · 4d985860
      Tails developers authored
      First we start the Tor Browser, then we run the step 'there is a GNOME
      bookmark for the amnesiac Tor Browser directory' which opens the GNOME
      Places menu. It seems this may cause the Ctrl+S key presses in the
      next step 'I can save the current page as "index.html" to the default
      downloads directory' to not reach the Tor Browser, but probably get
      lost in the Places menu before it closes from the Esc key press
      (Sikuli is fast!), so the step fails. The new step ordering prevents
      this from happening.
      4d985860
  23. 10 Feb, 2015 1 commit
  24. 06 Feb, 2015 1 commit
    • Tails developers's avatar
      WIP: Rename the Tor Browser "download" directory, again. And add automated... · 136db50c
      Tails developers authored
      WIP: Rename the Tor Browser "download" directory, again. And add automated tests for the Tor Browser.
      
      The idea is to make sure that the AppArmor confinement doesn't break too much
      functionality, and actually confines the browser a bit.
      
      Sorry for the non-atomic commit: getting directory name changing under my feet
      while the automated tests are being drafted made it too hard to split this in
      a nice way.
      136db50c
  25. 03 Feb, 2015 1 commit
  26. 30 Jan, 2015 1 commit
  27. 02 Oct, 2014 1 commit