|
| 1 | +extern crate serial_test; |
| 2 | + |
1 | 3 | use std::fs; |
2 | 4 | use std::io::{Read, Write}; |
3 | 5 | use std::net::{TcpListener, TcpStream}; |
4 | 6 | use std::process::{Command, Stdio}; |
5 | 7 | use std::string::String; |
6 | 8 | use std::thread; |
7 | 9 |
|
| 10 | +use self::serial_test::serial; |
| 11 | + |
8 | 12 | use super::*; |
9 | 13 |
|
10 | 14 | macro_rules! p { |
@@ -48,13 +52,15 @@ fn connect_bad_hostname_ignored() { |
48 | 52 | } |
49 | 53 |
|
50 | 54 | #[test] |
| 55 | +#[cfg_attr(target_os = "macos", serial)] |
51 | 56 | fn connect_no_root_certs() { |
52 | 57 | let builder = p!(TlsConnector::builder().disable_built_in_roots(true).build()); |
53 | 58 | let s = p!(TcpStream::connect("google.com:443")); |
54 | 59 | assert!(builder.connect("google.com", s).is_err()); |
55 | 60 | } |
56 | 61 |
|
57 | 62 | #[test] |
| 63 | +#[cfg_attr(target_os = "macos", serial)] |
58 | 64 | fn server_no_root_certs() { |
59 | 65 | let keys = test_cert_gen::keys(); |
60 | 66 |
|
@@ -96,6 +102,7 @@ fn server_no_root_certs() { |
96 | 102 | } |
97 | 103 |
|
98 | 104 | #[test] |
| 105 | +#[cfg_attr(target_os = "macos", serial)] |
99 | 106 | fn server() { |
100 | 107 | let keys = test_cert_gen::keys(); |
101 | 108 |
|
@@ -159,6 +166,7 @@ fn certificate_from_pem() { |
159 | 166 | } |
160 | 167 |
|
161 | 168 | #[test] |
| 169 | +#[cfg_attr(target_os = "macos", serial)] |
162 | 170 | fn peer_certificate() { |
163 | 171 | let keys = test_cert_gen::keys(); |
164 | 172 |
|
@@ -195,6 +203,7 @@ fn peer_certificate() { |
195 | 203 | } |
196 | 204 |
|
197 | 205 | #[test] |
| 206 | +#[cfg_attr(target_os = "macos", serial)] |
198 | 207 | fn server_tls11_only() { |
199 | 208 | let keys = test_cert_gen::keys(); |
200 | 209 |
|
@@ -240,6 +249,7 @@ fn server_tls11_only() { |
240 | 249 | } |
241 | 250 |
|
242 | 251 | #[test] |
| 252 | +#[cfg_attr(target_os = "macos", serial)] |
243 | 253 | fn server_no_shared_protocol() { |
244 | 254 | let keys = test_cert_gen::keys(); |
245 | 255 |
|
@@ -273,6 +283,7 @@ fn server_no_shared_protocol() { |
273 | 283 | } |
274 | 284 |
|
275 | 285 | #[test] |
| 286 | +#[cfg_attr(target_os = "macos", serial)] |
276 | 287 | fn server_untrusted() { |
277 | 288 | let keys = test_cert_gen::keys(); |
278 | 289 |
|
@@ -300,6 +311,7 @@ fn server_untrusted() { |
300 | 311 | } |
301 | 312 |
|
302 | 313 | #[test] |
| 314 | +#[cfg_attr(target_os = "macos", serial)] |
303 | 315 | fn server_untrusted_unverified() { |
304 | 316 | let keys = test_cert_gen::keys(); |
305 | 317 |
|
@@ -338,6 +350,7 @@ fn server_untrusted_unverified() { |
338 | 350 | } |
339 | 351 |
|
340 | 352 | #[test] |
| 353 | +#[cfg_attr(target_os = "macos", serial)] |
341 | 354 | fn import_same_identity_multiple_times() { |
342 | 355 | let keys = test_cert_gen::keys(); |
343 | 356 |
|
@@ -367,6 +380,7 @@ fn from_pkcs8_rejects_rsa_key() { |
367 | 380 | } |
368 | 381 |
|
369 | 382 | #[test] |
| 383 | +#[cfg_attr(target_os = "macos", serial)] |
370 | 384 | fn shutdown() { |
371 | 385 | let keys = test_cert_gen::keys(); |
372 | 386 |
|
|
0 commit comments