|
| 1 | +extern crate serial_test; |
| 2 | + |
1 | 3 | use std::fs;
|
2 | 4 | use std::io::{Read, Write};
|
3 | 5 | use std::net::{TcpListener, TcpStream};
|
4 | 6 | use std::process::{Command, Stdio};
|
5 | 7 | use std::string::String;
|
6 | 8 | use std::thread;
|
7 | 9 |
|
| 10 | +use self::serial_test::serial; |
| 11 | + |
8 | 12 | use super::*;
|
9 | 13 |
|
10 | 14 | macro_rules! p {
|
@@ -48,13 +52,15 @@ fn connect_bad_hostname_ignored() {
|
48 | 52 | }
|
49 | 53 |
|
50 | 54 | #[test]
|
| 55 | +#[cfg_attr(target_os = "macos", serial)] |
51 | 56 | fn connect_no_root_certs() {
|
52 | 57 | let builder = p!(TlsConnector::builder().disable_built_in_roots(true).build());
|
53 | 58 | let s = p!(TcpStream::connect("google.com:443"));
|
54 | 59 | assert!(builder.connect("google.com", s).is_err());
|
55 | 60 | }
|
56 | 61 |
|
57 | 62 | #[test]
|
| 63 | +#[cfg_attr(target_os = "macos", serial)] |
58 | 64 | fn server_no_root_certs() {
|
59 | 65 | let keys = test_cert_gen::keys();
|
60 | 66 |
|
@@ -96,6 +102,7 @@ fn server_no_root_certs() {
|
96 | 102 | }
|
97 | 103 |
|
98 | 104 | #[test]
|
| 105 | +#[cfg_attr(target_os = "macos", serial)] |
99 | 106 | fn server() {
|
100 | 107 | let keys = test_cert_gen::keys();
|
101 | 108 |
|
@@ -159,6 +166,7 @@ fn certificate_from_pem() {
|
159 | 166 | }
|
160 | 167 |
|
161 | 168 | #[test]
|
| 169 | +#[cfg_attr(target_os = "macos", serial)] |
162 | 170 | fn peer_certificate() {
|
163 | 171 | let keys = test_cert_gen::keys();
|
164 | 172 |
|
@@ -195,6 +203,7 @@ fn peer_certificate() {
|
195 | 203 | }
|
196 | 204 |
|
197 | 205 | #[test]
|
| 206 | +#[cfg_attr(target_os = "macos", serial)] |
198 | 207 | fn server_tls11_only() {
|
199 | 208 | let keys = test_cert_gen::keys();
|
200 | 209 |
|
@@ -240,6 +249,7 @@ fn server_tls11_only() {
|
240 | 249 | }
|
241 | 250 |
|
242 | 251 | #[test]
|
| 252 | +#[cfg_attr(target_os = "macos", serial)] |
243 | 253 | fn server_no_shared_protocol() {
|
244 | 254 | let keys = test_cert_gen::keys();
|
245 | 255 |
|
@@ -273,6 +283,7 @@ fn server_no_shared_protocol() {
|
273 | 283 | }
|
274 | 284 |
|
275 | 285 | #[test]
|
| 286 | +#[cfg_attr(target_os = "macos", serial)] |
276 | 287 | fn server_untrusted() {
|
277 | 288 | let keys = test_cert_gen::keys();
|
278 | 289 |
|
@@ -300,6 +311,7 @@ fn server_untrusted() {
|
300 | 311 | }
|
301 | 312 |
|
302 | 313 | #[test]
|
| 314 | +#[cfg_attr(target_os = "macos", serial)] |
303 | 315 | fn server_untrusted_unverified() {
|
304 | 316 | let keys = test_cert_gen::keys();
|
305 | 317 |
|
@@ -338,6 +350,7 @@ fn server_untrusted_unverified() {
|
338 | 350 | }
|
339 | 351 |
|
340 | 352 | #[test]
|
| 353 | +#[cfg_attr(target_os = "macos", serial)] |
341 | 354 | fn import_same_identity_multiple_times() {
|
342 | 355 | let keys = test_cert_gen::keys();
|
343 | 356 |
|
@@ -367,6 +380,7 @@ fn from_pkcs8_rejects_rsa_key() {
|
367 | 380 | }
|
368 | 381 |
|
369 | 382 | #[test]
|
| 383 | +#[cfg_attr(target_os = "macos", serial)] |
370 | 384 | fn shutdown() {
|
371 | 385 | let keys = test_cert_gen::keys();
|
372 | 386 |
|
|
0 commit comments