@@ -571,7 +571,16 @@ fn file_with_trailing_slashdot_ambient() {
571
571
assert ! ( Dir :: open_ambient_dir( dir. path( ) . join( "file/..." ) , ambient_authority( ) ) . is_err( ) ) ;
572
572
}
573
573
574
- #[ cfg( all( unix, not( any( target_os = "ios" , target_os = "macos" ) ) ) ) ]
574
+ #[ cfg( all(
575
+ unix,
576
+ not( any(
577
+ target_os = "ios" ,
578
+ target_os = "macos" ,
579
+ target_os = "tvos" ,
580
+ target_os = "watchos" ,
581
+ target_os = "visionos" ,
582
+ ) )
583
+ ) ) ]
575
584
#[ test]
576
585
fn dir_searchable_unreadable ( ) {
577
586
use cap_std:: fs:: { DirBuilder , DirBuilderExt } ;
@@ -593,7 +602,16 @@ fn dir_searchable_unreadable() {
593
602
/// This test is the same as `dir_searchable_unreadable` but uses `std::fs`'
594
603
/// ambient API instead of `cap_std`. The purpose of this test is to
595
604
/// confirm fundamentally OS-specific differences.
596
- #[ cfg( all( unix, not( any( target_os = "ios" , target_os = "macos" ) ) ) ) ]
605
+ #[ cfg( all(
606
+ unix,
607
+ not( any(
608
+ target_os = "ios" ,
609
+ target_os = "macos" ,
610
+ target_os = "tvos" ,
611
+ target_os = "watchos" ,
612
+ target_os = "visionos" ,
613
+ ) )
614
+ ) ) ]
597
615
#[ test]
598
616
fn dir_searchable_unreadable_ambient ( ) {
599
617
use std:: fs;
@@ -615,7 +633,13 @@ fn dir_searchable_unreadable_ambient() {
615
633
616
634
/// On Darwin, we don't have a race-free way to create a subdirectory within
617
635
/// a directory that we don't have read access to.
618
- #[ cfg( any( target_os = "ios" , target_os = "macos" ) ) ]
636
+ #[ cfg( any(
637
+ target_os = "ios" ,
638
+ target_os = "macos" ,
639
+ target_os = "tvos" ,
640
+ target_os = "watchos" ,
641
+ target_os = "visionos" ,
642
+ ) ) ]
619
643
#[ test]
620
644
fn dir_searchable_unreadable ( ) {
621
645
use cap_std:: fs:: { DirBuilder , DirBuilderExt } ;
0 commit comments