blob: 75f3fd0b8b4e2cdd15ede2a367e4993e2e16df2c (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
|
@product @check_tor_leaks @fragile
Feature: Various checks for torified software
Background:
Given I have started Tails from DVD and logged in and the network is connected
Scenario: wget(1) should work for HTTP and go through Tor.
When I wget "http://example.com/" to stdout
Then the wget command is successful
And the wget standard output contains "Example Domain"
Scenario: wget(1) should work for HTTPS and go through Tor.
When I wget "https://example.com/" to stdout
Then the wget command is successful
And the wget standard output contains "Example Domain"
Scenario: wget(1) with tricky options should work for HTTP and go through Tor.
When I wget "http://195.154.14.189/tails/stable/" to stdout with the '--spider --header="Host: dl.amnesia.boum.org"' options
Then the wget command is successful
Scenario: whois(1) should work and go through Tor.
When I query the whois directory service for "torproject.org"
Then the whois command is successful
Then the whois standard output contains "The Tor Project"
|