diff options
Diffstat (limited to 'features/root_access_control.feature')
-rw-r--r-- | features/root_access_control.feature | 13 |
1 files changed, 2 insertions, 11 deletions
diff --git a/features/root_access_control.feature b/features/root_access_control.feature index 47aa0bc7..569dd2a8 100644 --- a/features/root_access_control.feature +++ b/features/root_access_control.feature @@ -6,13 +6,6 @@ Feature: Root access control enforcement But when I do not set an administration password I should not be able to attain administration privileges at all. - Background: - Given a computer - And the network is unplugged - And I start the computer - And the computer boots Tails - And I save the state so the background can be restored next scenario - Scenario: If an administrative password is set in Tails Greeter the live user should be able to run arbitrary commands with administrative privileges. Given I set sudo password "asdf" And I log in to a new session @@ -20,7 +13,7 @@ Feature: Root access control enforcement Then I should be able to run administration commands as the live user Scenario: If no administrative password is set in Tails Greeter the live user should not be able to run arbitrary commands administrative privileges. - Given I log in to a new session + Given I have started Tails from DVD without network and logged in And Tails Greeter has dealt with the sudo password Then I should not be able to run administration commands as the live user with the "" password And I should not be able to run administration commands as the live user with the "amnesia" password @@ -35,8 +28,6 @@ Feature: Root access control enforcement Then I should be able to run a command as root with pkexec Scenario: If no administrative password is set in Tails Greeter the live user should not be able to get administrative privileges through PolicyKit with the standard passwords. - Given I log in to a new session - And Tails Greeter has dealt with the sudo password - And GNOME has started + Given I have started Tails from DVD without network and logged in And running a command as root with pkexec requires PolicyKit administrator privileges Then I should not be able to run a command as root with pkexec and the standard passwords |