From da080c472fc415b0ce918f4dd4a1ab143bb1bca4 Mon Sep 17 00:00:00 2001 From: Philip Hands Date: Mon, 14 Mar 2016 15:36:16 +0100 Subject: rough attempt to grab the good cucumber bits from recent tails --- features/torified_misc.feature | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 features/torified_misc.feature (limited to 'features/torified_misc.feature') diff --git a/features/torified_misc.feature b/features/torified_misc.feature new file mode 100644 index 00000000..75f3fd0b --- /dev/null +++ b/features/torified_misc.feature @@ -0,0 +1,24 @@ +@product @check_tor_leaks @fragile +Feature: Various checks for torified software + + Background: + Given I have started Tails from DVD and logged in and the network is connected + + Scenario: wget(1) should work for HTTP and go through Tor. + When I wget "http://example.com/" to stdout + Then the wget command is successful + And the wget standard output contains "Example Domain" + + Scenario: wget(1) should work for HTTPS and go through Tor. + When I wget "https://example.com/" to stdout + Then the wget command is successful + And the wget standard output contains "Example Domain" + + Scenario: wget(1) with tricky options should work for HTTP and go through Tor. + When I wget "http://195.154.14.189/tails/stable/" to stdout with the '--spider --header="Host: dl.amnesia.boum.org"' options + Then the wget command is successful + + Scenario: whois(1) should work and go through Tor. + When I query the whois directory service for "torproject.org" + Then the whois command is successful + Then the whois standard output contains "The Tor Project" -- cgit v1.2.3-70-g09d2