@@ -571,7 +571,16 @@ fn file_with_trailing_slashdot_ambient() {
571571 assert ! ( Dir :: open_ambient_dir( dir. path( ) . join( "file/..." ) , ambient_authority( ) ) . is_err( ) ) ;
572572}
573573
574- #[ cfg( all( unix, not( any( target_os = "ios" , target_os = "macos" ) ) ) ) ]
574+ #[ cfg( all(
575+ unix,
576+ not( any(
577+ target_os = "ios" ,
578+ target_os = "macos" ,
579+ target_os = "tvos" ,
580+ target_os = "watchos" ,
581+ target_os = "visionos" ,
582+ ) )
583+ ) ) ]
575584#[ test]
576585fn dir_searchable_unreadable ( ) {
577586 use cap_std:: fs:: { DirBuilder , DirBuilderExt } ;
@@ -593,7 +602,16 @@ fn dir_searchable_unreadable() {
593602/// This test is the same as `dir_searchable_unreadable` but uses `std::fs`'
594603/// ambient API instead of `cap_std`. The purpose of this test is to
595604/// confirm fundamentally OS-specific differences.
596- #[ cfg( all( unix, not( any( target_os = "ios" , target_os = "macos" ) ) ) ) ]
605+ #[ cfg( all(
606+ unix,
607+ not( any(
608+ target_os = "ios" ,
609+ target_os = "macos" ,
610+ target_os = "tvos" ,
611+ target_os = "watchos" ,
612+ target_os = "visionos" ,
613+ ) )
614+ ) ) ]
597615#[ test]
598616fn dir_searchable_unreadable_ambient ( ) {
599617 use std:: fs;
@@ -615,7 +633,13 @@ fn dir_searchable_unreadable_ambient() {
615633
616634/// On Darwin, we don't have a race-free way to create a subdirectory within
617635/// a directory that we don't have read access to.
618- #[ cfg( any( target_os = "ios" , target_os = "macos" ) ) ]
636+ #[ cfg( any(
637+ target_os = "ios" ,
638+ target_os = "macos" ,
639+ target_os = "tvos" ,
640+ target_os = "watchos" ,
641+ target_os = "visionos" ,
642+ ) ) ]
619643#[ test]
620644fn dir_searchable_unreadable ( ) {
621645 use cap_std:: fs:: { DirBuilder , DirBuilderExt } ;
0 commit comments