- 03 Dec, 2015 1 commit
-
- 15 Oct, 2015 2 commits
- 06 Oct, 2015 1 commit
-
-
anonym authored
Essentially I did: sed -i 's/Tails has booted/I have started Tails/' -- \ features/*.feature features/step_definitions/snapshots.rb (although there was a false positive that I had to restore)
-
- 02 Oct, 2015 1 commit
-
-
anonym authored
-
- 14 Aug, 2015 1 commit
-
-
anonym authored
-
- 13 Aug, 2015 1 commit
-
-
anonym authored
Most of the time when testing persistence, this is what we need so it will save some time and make the scenarios simpler.
-
- 08 Aug, 2015 2 commits
-
-
intrigeri authored
-
anonym authored
The basic idea is to first run a "I start monitoring the AppArmor log" step, which records the current time, and that any "AppArmor has denied" step run for the same profile later will only look at entries from that time and on. The wordings on the steps now make the scenarios a bit clearer, and we also don't have to clear syslog any more as an ugly workaround. Furthermore, this will bring us close to a clean solution of #9924, which will require us to run a sysctl command *before* anything that could generate the AppArmor log entries we're interested in. The "I monitor" step is a perfect candidate for that, wereas we before would need yet another step.
-
- 05 Aug, 2015 6 commits
- 04 Aug, 2015 1 commit
-
-
anonym authored
... because when the user-tmp abstraction is used, AppArmor doesn't log it.
-
- 11 Jul, 2015 1 commit
-
-
intrigeri authored
-
- 02 Jul, 2015 1 commit
-
-
anonym authored
-
- 29 Jun, 2015 1 commit
-
-
anonym authored
... by looking in the audit log. This way we actually know that apparmor denied the operation, and so we don't get false positives of some classes of errors (e.g. the file simply has wrong permission or similar). Since we migrated to a browser based on Firefox esr38 we no longer get any graphical feedback for the apparmor blocking, which is the actual reason for implementing this.
-
- 03 Jun, 2015 4 commits
-
-
intrigeri authored
Test suite: make sure we don't find TorBrowserUnableToOpen.png *before* the page we're not supposed to be able to load was actually loaded. In the previous state of this test, even if the forbidden page could be "successfully" loaded, a fast enough testing system would find TorBrowserUnableToOpen.png earlier, and then the test would pass even though it should not.
-
intrigeri authored
Test suite: add a anti-test to (in)validate the 'I see "TorBrowserUnableToOpen.png" after at most 10 seconds' one.
-
intrigeri authored
-
intrigeri authored
-
- 28 May, 2015 2 commits
- 27 May, 2015 1 commit
-
- 15 May, 2015 2 commits
- 14 May, 2015 1 commit
-
-
anonym authored
-
- 05 May, 2015 1 commit
-
-
kytv authored
-
- 10 Apr, 2015 2 commits
-
-
anonym authored
It shouldn't be needed for the Tor Browser test since we check the network traffic, but we'll need it when testing the Unsafe Browser, so why not?
-
anonym authored
Since no HTTP server is listening on the LAN resource the Tor Browser would show the same "Unable to connect" error message even if the request wasn't blocked. We should be fine, though, since we check the captured traffic. The picture is more of a signal saying that "now the network traffic would have been generated *if* the request isn't blocked" which we use to know when to check the network capture.
-
- 18 Feb, 2015 1 commit
-
-
Tails developers authored
Instead of the explicit steps for capturing all traffic and checking for leaks.
-
- 12 Feb, 2015 1 commit
-
-
Tails developers authored
First we start the Tor Browser, then we run the step 'there is a GNOME bookmark for the amnesiac Tor Browser directory' which opens the GNOME Places menu. It seems this may cause the Ctrl+S key presses in the next step 'I can save the current page as "index.html" to the default downloads directory' to not reach the Tor Browser, but probably get lost in the Places menu before it closes from the Esc key press (Sikuli is fast!), so the step fails. The new step ordering prevents this from happening.
-
- 10 Feb, 2015 1 commit
-
-
Tails developers authored
The previous implementation fails consistently for anonym, likely because the ENTER key event isn't bound to its callback early enough, or similar. Let's hope the OK button isn't displayed as being ready before it really is.
-
- 06 Feb, 2015 1 commit
-
-
Tails developers authored
WIP: Rename the Tor Browser "download" directory, again. And add automated tests for the Tor Browser. The idea is to make sure that the AppArmor confinement doesn't break too much functionality, and actually confines the browser a bit. Sorry for the non-atomic commit: getting directory name changing under my feet while the automated tests are being drafted made it too hard to split this in a nice way.
-
- 03 Feb, 2015 1 commit
-
-
Tails developers authored
-
- 30 Jan, 2015 1 commit
-
-
Tails developers authored
-
- 02 Oct, 2014 1 commit
-
-
Tails developers authored
-
- 24 Sep, 2014 1 commit
-
-
Tails developers authored
Beyond s/Iceweasel/Tor Browser/ (incl. renaming affected images) we also try to rely more on clicking on GUI elements instead of keyboard shortcuts. The TBB is noticeably slower on start, and often loses key presses at that stage, so clicking is much more reliable then. The most remarkable change may be the switch to the step "the Tor Browser has started and loaded the startup page". It seems a fair amount of complexity is required to reliably stop the loading of the startup page so this simpler approach seems better, and as a bonus it actualy tests the startup page. The issue described in the removed comment doesn't seem very relevant any more, too.
-