1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
|
When /^I see and accept the Unsafe Browser start verification$/ do
@screen.wait('GnomeQuestionDialogIcon.png', 30)
@screen.type(Sikuli::Key.ESC)
end
def supported_torbrowser_languages
localization_descriptions = "#{Dir.pwd}/config/chroot_local-includes/usr/share/tails/browser-localization/descriptions"
File.read(localization_descriptions).split("\n").map do |line|
# The line will be of the form "xx:YY:..." or "xx-YY:YY:..."
first, second = line.sub('-', '_').split(':')
candidates = ["#{first}_#{second}.utf8", "#{first}.utf8",
"#{first}_#{second}", first]
when_not_found = Proc.new { raise "Could not find a locale for '#{line}'" }
candidates.find(when_not_found) do |candidate|
$vm.directory_exist?("/usr/lib/locale/#{candidate}")
end
end
end
Then /^I start the Unsafe Browser in the "([^"]+)" locale$/ do |loc|
step "I run \"LANG=#{loc} LC_ALL=#{loc} sudo unsafe-browser\" in GNOME Terminal"
step "I see and accept the Unsafe Browser start verification"
end
Then /^the Unsafe Browser works in all supported languages$/ do
failed = Array.new
supported_torbrowser_languages.each do |lang|
step "I start the Unsafe Browser in the \"#{lang}\" locale"
begin
step "the Unsafe Browser has started"
rescue RuntimeError
failed << lang
next
end
step "I close the Unsafe Browser"
step "the Unsafe Browser chroot is torn down"
end
assert(failed.empty?, "Unsafe Browser failed to launch in the following locale(s): #{failed.join(', ')}")
end
Then /^the Unsafe Browser has no add-ons installed$/ do
step "I open the address \"about:addons\" in the Unsafe Browser"
step "I see \"UnsafeBrowserNoAddons.png\" after at most 30 seconds"
end
Then /^the Unsafe Browser has only Firefox's default bookmarks configured$/ do
info = xul_application_info("Unsafe Browser")
# "Show all bookmarks"
@screen.type("o", Sikuli::KeyModifier.SHIFT + Sikuli::KeyModifier.CTRL)
@screen.wait_and_click("UnsafeBrowserExportBookmarksButton.png", 20)
@screen.wait_and_click("UnsafeBrowserExportBookmarksMenuEntry.png", 20)
@screen.wait("UnsafeBrowserExportBookmarksSavePrompt.png", 20)
path = "/home/#{info[:user]}/bookmarks"
@screen.type(path + Sikuli::Key.ENTER)
chroot_path = "#{info[:chroot]}/#{path}.json"
try_for(10) { $vm.file_exist?(chroot_path) }
dump = JSON.load($vm.file_content(chroot_path))
def check_bookmarks_helper(a)
mozilla_uris_counter = 0
places_uris_counter = 0
a.each do |h|
h.each_pair do |k, v|
if k == "children"
m, p = check_bookmarks_helper(v)
mozilla_uris_counter += m
places_uris_counter += p
elsif k == "uri"
uri = v
if uri.match("^https://www\.mozilla\.org/")
mozilla_uris_counter += 1
elsif uri.match("^place:(sort|folder|type)=")
places_uris_counter += 1
else
raise "Unexpected Unsafe Browser bookmark for '#{uri}'"
end
end
end
end
return [mozilla_uris_counter, places_uris_counter]
end
mozilla_uris_counter, places_uris_counter =
check_bookmarks_helper(dump["children"])
assert_equal(5, mozilla_uris_counter,
"Unexpected number (#{mozilla_uris_counter}) of mozilla " \
"bookmarks")
assert_equal(3, places_uris_counter,
"Unexpected number (#{places_uris_counter}) of places " \
"bookmarks")
@screen.type(Sikuli::Key.F4, Sikuli::KeyModifier.ALT)
end
Then /^the Unsafe Browser has a red theme$/ do
@screen.wait("UnsafeBrowserRedTheme.png", 10)
end
Then /^the Unsafe Browser shows a warning as its start page$/ do
@screen.wait("UnsafeBrowserStartPage.png", 10)
end
Then /^I see a warning about another instance already running$/ do
@screen.wait('UnsafeBrowserWarnAlreadyRunning.png', 10)
end
Then /^I can start the Unsafe Browser again$/ do
step "I start the Unsafe Browser"
end
Then /^I cannot configure the Unsafe Browser to use any local proxies$/ do
socks_proxy = 'c' # Alt+c for socks proxy
no_proxy = 'y' # Alt+y for no proxy
proxies = [[no_proxy, nil, nil]]
socksport_lines =
$vm.execute_successfully('grep -w "^SocksPort" /etc/tor/torrc').stdout
assert(socksport_lines.size >= 4, "We got fewer than four Tor SocksPorts")
socksports = socksport_lines.scan(/^SocksPort\s([^:]+):(\d+)/)
proxies += socksports.map { |host, port| [socks_proxy, host, port] }
proxies.each do |proxy_type, proxy_host, proxy_port|
@screen.hide_cursor
# Open proxy settings and select manual proxy configuration
@screen.click('UnsafeBrowserMenuButton.png')
@screen.wait_and_click('UnsafeBrowserPreferencesButton.png', 10)
@screen.wait_and_click('UnsafeBrowserAdvancedSettingsButton.png', 10)
hit, _ = @screen.waitAny(['UnsafeBrowserNetworkTabAlreadySelected.png',
'UnsafeBrowserNetworkTab.png'], 10)
@screen.click(hit) if hit == 'UnsafeBrowserNetworkTab.png'
@screen.wait_and_click('UnsafeBrowserNetworkTabSettingsButton.png', 10)
@screen.wait_and_click('UnsafeBrowserProxySettingsWindow.png', 10)
@screen.type("m", Sikuli::KeyModifier.ALT)
# Configure the proxy
@screen.type(proxy_type, Sikuli::KeyModifier.ALT) # Select correct proxy type
@screen.type(proxy_host + Sikuli::Key.TAB + proxy_port) if proxy_type != no_proxy
# Close settings
@screen.click('UnsafeBrowserProxySettingsOkButton.png')
@screen.waitVanish('UnsafeBrowserProxySettingsWindow.png', 10)
# Test that the proxy settings work as they should
step "I open the address \"https://check.torproject.org\" in the Unsafe Browser"
if proxy_type == no_proxy
@screen.wait('UnsafeBrowserTorCheckFail.png', 60)
else
@screen.wait('UnsafeBrowserProxyRefused.png', 60)
end
end
end
Then /^the Unsafe Browser has no proxy configured$/ do
@screen.click('UnsafeBrowserMenuButton.png')
@screen.wait_and_click('UnsafeBrowserPreferencesButton.png', 10)
@screen.wait_and_click('UnsafeBrowserAdvancedSettingsButton.png', 10)
@screen.wait_and_click('UnsafeBrowserNetworkTab.png', 10)
@screen.wait_and_click('UnsafeBrowserNetworkTabSettingsButton.png', 10)
@screen.wait('UnsafeBrowserProxySettingsWindow.png', 10)
@screen.wait('UnsafeBrowserNoProxySelected.png', 10)
@screen.type(Sikuli::Key.F4, Sikuli::KeyModifier.ALT)
@screen.type("w", Sikuli::KeyModifier.CTRL)
end
Then /^the Unsafe Browser complains that no DNS server is configured$/ do
@screen.wait("UnsafeBrowserDNSError.png", 30)
end
Then /^I configure the Unsafe Browser to check for updates more frequently$/ do
prefs = '/usr/share/tails/chroot-browsers/unsafe-browser/prefs.js'
$vm.file_append(prefs, 'pref("app.update.idletime", 1);')
$vm.file_append(prefs, 'pref("app.update.promptWaitTime", 1);')
$vm.file_append(prefs, 'pref("app.update.interval", 5);')
end
But /^checking for updates is disabled in the Unsafe Browser's configuration$/ do
prefs = '/usr/share/tails/chroot-browsers/common/prefs.js'
assert($vm.file_content(prefs).include?('pref("app.update.enabled", false)'))
end
Then /^the clearnet user has (|not )sent packets out to the Internet$/ do |sent|
uid = $vm.execute_successfully("id -u clearnet").stdout.chomp.to_i
pkts = ip4tables_packet_counter_sum(:tables => ['OUTPUT'], :uid => uid)
case sent
when ''
assert(pkts > 0, "Packets have not gone out to the internet.")
when 'not'
assert_equal(pkts, 0, "Packets have gone out to the internet.")
end
end
|