Disable outerloop tests on mono/mobile and fix timeout in sendtohelixhelp.proj (...
authorAlexander Köplinger <alex.koeplinger@outlook.com>
Tue, 11 Jul 2023 08:30:02 +0000 (10:30 +0200)
committerGitHub <noreply@github.com>
Tue, 11 Jul 2023 08:30:02 +0000 (10:30 +0200)
The Helix workitem timeout still looked for the old `Outerloop` property but we're using `TestScope` instead now.

30 files changed:
eng/pipelines/libraries/outerloop-mono.yml
src/libraries/System.Diagnostics.DiagnosticSource/tests/DiagnosticSourceTests.cs
src/libraries/System.Diagnostics.Process/tests/ProcessStartInfoTests.Windows.cs
src/libraries/System.Diagnostics.Process/tests/ProcessStartInfoTests.cs
src/libraries/System.Diagnostics.Process/tests/ProcessTests.Unix.cs
src/libraries/System.Diagnostics.Process/tests/ProcessTests.cs
src/libraries/System.DirectoryServices.AccountManagement/tests/PrincipalContextTests.cs
src/libraries/System.DirectoryServices/tests/System/DirectoryServices/ActiveDirectory/ActiveDirectoryInterSiteTransportTests.cs
src/libraries/System.DirectoryServices/tests/System/DirectoryServices/ActiveDirectory/DomainControllerTests.cs
src/libraries/System.DirectoryServices/tests/System/DirectoryServices/ActiveDirectory/ForestTests.cs
src/libraries/System.Formats.Tar/tests/TarWriter/TarWriter.WriteEntry.LongFile.Tests.cs
src/libraries/System.Formats.Tar/tests/TarWriter/TarWriter.WriteEntryAsync.LongFile.Tests.cs
src/libraries/System.Management/tests/System/Management/ManagementEventWatcherTests.cs
src/libraries/System.Management/tests/System/Management/ManagementObjectSearcherTests.cs
src/libraries/System.Management/tests/System/Management/ManagementObjectSearcherTestsMofRequired.cs
src/libraries/System.Management/tests/System/Management/ManagementObjectTests.cs
src/libraries/System.Memory/tests/EncodingExtensions/EncodingExtensionsTests.cs
src/libraries/System.Net.Ping/tests/FunctionalTests/PingTest.cs
src/libraries/System.Runtime.Extensions/tests/System/EnvironmentTests.cs
src/libraries/System.Runtime.Numerics/tests/BigInteger/BigIntegerToStringTests.cs
src/libraries/System.Runtime/tests/System/DoubleTests.cs
src/libraries/System.Security.Cryptography.Pkcs/tests/EnvelopedCms/DecryptTests.cs
src/libraries/System.Security.Cryptography.Pkcs/tests/EnvelopedCms/DecryptTestsRsaPaddingModeTests.cs
src/libraries/System.Security.Principal.Windows/tests/WindowsIdentityImpersonatedTests.netcoreapp.cs
src/libraries/System.Text.Json/tests/Common/CollectionTests/CollectionTests.AsyncEnumerable.cs
src/libraries/System.Text.Json/tests/Common/ConstructorTests/ConstructorTests.Cache.cs
src/libraries/System.Text.RegularExpressions/tests/FunctionalTests/Regex.KnownPattern.Tests.cs
src/libraries/System.Text.RegularExpressions/tests/FunctionalTests/Regex.Match.Tests.cs
src/libraries/System.Text.RegularExpressions/tests/FunctionalTests/RegexIgnoreCaseTests.cs
src/libraries/sendtohelixhelp.proj

index dd0ef5b..8cca7c4 100644 (file)
@@ -1,13 +1,11 @@
 trigger: none
 
-# Disabled until we get the build clean
-# schedules:
-# - cron: "0 8 * * *" # 8 AM UTC => 12 AM PST
-#   displayName: Outerloop scheduled build
-#   branches:
-#     include:
-#     - main
-#     - release/*.*
+schedules:
+- cron: "0 8 * * *" # 8 AM UTC => 12 AM PST
+  displayName: Outerloop scheduled build
+  branches:
+    include:
+    - main
 
 variables:
   - template: variables.yml
index ae93b7a..a806cc0 100644 (file)
@@ -534,6 +534,7 @@ namespace System.Diagnostics.Tests
         [InlineData(100, 102)]
         [InlineData(100, 103)]
         [InlineData(100, 104)]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/79906", TestRuntimes.Mono)]
         public void AllSubscriberStress(int numThreads, int numListenersPerThread)
         {
             // No listeners have been created yet
index 6da564e..ad1ca39 100644 (file)
@@ -17,6 +17,7 @@ namespace System.Diagnostics.Tests
         [ConditionalFact(nameof(IsAdmin_IsNotNano_RemoteExecutorIsSupported_CanShareFiles))] // Nano has no "netapi32.dll", Admin rights are required
         [PlatformSpecific(TestPlatforms.Windows)]
         [OuterLoop("Requires admin privileges")]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/80019", TestRuntimes.Mono)]
         public void TestUserNetworkCredentialsPropertiesOnWindows()
         {
             const string ShareName = "testForDotNet";
index 2370d07..c2458a9 100644 (file)
@@ -465,6 +465,7 @@ namespace System.Diagnostics.Tests
         [ConditionalFact(nameof(IsAdmin_IsNotNano_RemoteExecutorIsSupported))] // Nano has no "netapi32.dll", Admin rights are required
         [PlatformSpecific(TestPlatforms.Windows)]
         [OuterLoop("Requires admin privileges")]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/80019", TestRuntimes.Mono)]
         public void TestUserCredentialsPropertiesOnWindows()
         {
             using Process longRunning = CreateProcessLong();
@@ -1060,6 +1061,7 @@ namespace System.Diagnostics.Tests
         [MemberData(nameof(UseShellExecute))]
         [OuterLoop("Launches notepad")]
         [PlatformSpecific(TestPlatforms.Windows)]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34685", TestRuntimes.Mono)]
         public void StartInfo_NotepadWithContent(bool useShellExecute)
         {
             string tempFile = GetTestFilePath() + ".txt";
@@ -1093,6 +1095,7 @@ namespace System.Diagnostics.Tests
                                                     nameof(PlatformDetection.IsNotWindows8x))] // https://github.com/dotnet/runtime/issues/22007
         [OuterLoop("Launches notepad")]
         [PlatformSpecific(TestPlatforms.Windows)]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34685", TestRuntimes.Mono)]
         public void StartInfo_TextFile_ShellExecute()
         {
             // create a new extension that nobody else should be using
@@ -1290,6 +1293,7 @@ namespace System.Diagnostics.Tests
         [MemberData(nameof(UseShellExecute))]
         [OuterLoop("Launches notepad")]
         [PlatformSpecific(TestPlatforms.Windows)]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34685", TestRuntimes.Mono)]
         public void StartInfo_NotepadWithContent_withArgumentList(bool useShellExecute)
         {
             string tempFile = GetTestFilePath() + ".txt";
index b29de57..2085fdd 100644 (file)
@@ -81,6 +81,7 @@ namespace System.Diagnostics.Tests
         [Fact]
         [OuterLoop("Opens program")]
         [SkipOnPlatform(TestPlatforms.MacCatalyst, "In App Sandbox mode, the process doesn't have read access to the binary.")]
+        [SkipOnPlatform(TestPlatforms.iOS | TestPlatforms.tvOS | TestPlatforms.Android | TestPlatforms.Browser, "Not supported on iOS/tvOS/Android/Browser.")]
         public void ProcessStart_DirectoryNameInCurDirectorySameAsFileNameInExecDirectory_Success()
         {
             string fileToOpen = "dotnet";
@@ -110,6 +111,7 @@ namespace System.Diagnostics.Tests
 
         [Fact]
         [OuterLoop]
+        [SkipOnPlatform(TestPlatforms.iOS | TestPlatforms.tvOS | TestPlatforms.Android | TestPlatforms.Browser, "Not supported on iOS/tvOS/Android/Browser.")]
         public void ProcessStart_UseShellExecute_OnUnix_OpenMissingFile_DoesNotThrow()
         {
             if (OperatingSystem.IsLinux() &&
@@ -129,6 +131,7 @@ namespace System.Diagnostics.Tests
 
         [Theory, InlineData(true), InlineData(false)]
         [OuterLoop("Opens program")]
+        [SkipOnPlatform(TestPlatforms.iOS | TestPlatforms.tvOS | TestPlatforms.Android | TestPlatforms.Browser, "Not supported on iOS/tvOS/Android/Browser.")]
         public void ProcessStart_UseShellExecute_OnUnix_SuccessWhenProgramInstalled(bool isFolder)
         {
             string programToOpen = s_allowedProgramsToRun.FirstOrDefault(program => IsProgramInstalled(program));
index 3936253..7b64250 100644 (file)
@@ -244,7 +244,7 @@ namespace System.Diagnostics.Tests
 
         [ConditionalFact(typeof(PlatformDetection), nameof(PlatformDetection.HasWindowsShell))]
         [OuterLoop("Launches File Explorer")]
-        [SkipOnPlatform(TestPlatforms.iOS | TestPlatforms.tvOS, "Not supported on iOS and tvOS.")]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34685", TestRuntimes.Mono)]
         public void ProcessStart_UseShellExecute_OnWindows_OpenMissingFile_Throws()
         {
             string fileToOpen = Path.Combine(Environment.CurrentDirectory, "_no_such_file.TXT");
@@ -257,7 +257,7 @@ namespace System.Diagnostics.Tests
         [InlineData(true)]
         [InlineData(false)]
         [OuterLoop("Launches File Explorer")]
-        [SkipOnPlatform(TestPlatforms.iOS | TestPlatforms.tvOS, "Not supported on iOS and tvOS.")]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34685", TestRuntimes.Mono)]
         public void ProcessStart_UseShellExecute_OnWindows_DoesNotThrow(bool isFolder)
         {
             string fileToOpen;
index c011aa7..29fe1ba 100644 (file)
@@ -24,6 +24,7 @@ namespace System.DirectoryServices.AccountManagement.Tests
         }
 
         [ConditionalTheory(typeof(PlatformDetection), nameof(PlatformDetection.IsNotWindowsNanoNorServerCore))]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34442", TestPlatforms.Windows, TargetFrameworkMonikers.Netcoreapp, TestRuntimes.Mono)]
         [OuterLoop("Takes too long on domain joined machines")]
         [InlineData(ContextType.Machine, null)]
         [InlineData(ContextType.Machine, "")]
@@ -50,6 +51,7 @@ namespace System.DirectoryServices.AccountManagement.Tests
         }
 
         [ConditionalTheory(typeof(PlatformDetection), nameof(PlatformDetection.IsNotWindowsNanoNorServerCore))]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34442", TestPlatforms.Windows, TargetFrameworkMonikers.Netcoreapp, TestRuntimes.Mono)]
         [OuterLoop("Takes too long on domain joined machines")]
         [InlineData(ContextType.Machine, null, null)]
         [InlineData(ContextType.Machine, "", null)]
@@ -76,6 +78,7 @@ namespace System.DirectoryServices.AccountManagement.Tests
         }
 
         [ConditionalTheory(typeof(PlatformDetection), nameof(PlatformDetection.IsNotWindowsNanoNorServerCore))]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34442", TestPlatforms.Windows, TargetFrameworkMonikers.Netcoreapp, TestRuntimes.Mono)]
         [OuterLoop("Takes too long on domain joined machines")]
         [InlineData(ContextType.Machine, null, null, ContextOptions.Negotiate)]
         [InlineData(ContextType.Machine, "", null, ContextOptions.Negotiate)]
index 7d99c86..be454aa 100644 (file)
@@ -48,6 +48,7 @@ namespace System.DirectoryServices.ActiveDirectory.Tests
         }
 
         [ConditionalTheory(typeof(PlatformDetection), nameof(PlatformDetection.IsNotWindowsNanoServer))]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34442", TestPlatforms.Windows, TargetFrameworkMonikers.Netcoreapp, TestRuntimes.Mono)]
         [OuterLoop("Takes too long on domain joined machines")]
         [InlineData(DirectoryContextType.ApplicationPartition)]
         [InlineData(DirectoryContextType.DirectoryServer)]
index e832acc..b69b52c 100644 (file)
@@ -27,6 +27,7 @@ namespace System.DirectoryServices.ActiveDirectory.Tests
         }
 
         [ConditionalTheory(typeof(PlatformDetection), nameof(PlatformDetection.IsNotWindowsNanoServer))]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34442", TestPlatforms.Windows, TargetFrameworkMonikers.Netcoreapp, TestRuntimes.Mono)]
         [OuterLoop("Takes too long on domain joined machines")]
         [InlineData("\0")]
         [InlineData("[")]
index 64e7079..c32dd0c 100644 (file)
@@ -48,6 +48,7 @@ namespace System.DirectoryServices.ActiveDirectory.Tests
         }
 
         [ConditionalTheory(typeof(PlatformDetection), nameof(PlatformDetection.IsNotWindowsNanoServer))]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34442", TestPlatforms.Windows, TargetFrameworkMonikers.Netcoreapp, TestRuntimes.Mono)]
         [OuterLoop("Takes too long on domain joined machines")]
         [InlineData(DirectoryContextType.Forest, "\0")]
         [InlineData(DirectoryContextType.DirectoryServer, "server:port")]
index 613e30c..1368f45 100644 (file)
@@ -27,6 +27,7 @@ namespace System.Formats.Tar.Tests
 
         [Theory]
         [MemberData(nameof(WriteEntry_LongFileSize_TheoryData))]
+        [SkipOnPlatform(TestPlatforms.iOS | TestPlatforms.tvOS | TestPlatforms.Android | TestPlatforms.Browser, "Needs too much disk space.")]
         public void WriteEntry_LongFileSize(TarEntryFormat entryFormat, long size, bool unseekableStream)
         {
             // Write archive with a 8 Gb long entry.
index 6d260cc..837da5f 100644 (file)
@@ -17,6 +17,7 @@ namespace System.Formats.Tar.Tests
 
         [Theory]
         [MemberData(nameof(WriteEntry_LongFileSize_TheoryDataAsync))]
+        [SkipOnPlatform(TestPlatforms.iOS | TestPlatforms.tvOS | TestPlatforms.Android | TestPlatforms.Browser, "Needs too much disk space.")]
         public async Task WriteEntry_LongFileSizeAsync(TarEntryFormat entryFormat, long size, bool unseekableStream)
         {
             // Write archive with a 8 Gb long entry.
index d91f3b5..ac2cfde 100644 (file)
@@ -12,6 +12,7 @@ namespace System.Management.Tests
         private const string Query = "SELECT * FROM __TimerEvent WHERE TimerID = 'MyEvent'";
 
         [ConditionalFact(typeof(WmiTestHelper), nameof(WmiTestHelper.IsElevatedAndSupportsWmi))]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34689", TestPlatforms.Windows, TargetFrameworkMonikers.Netcoreapp, TestRuntimes.Mono)]
         [OuterLoop]
         public void Receive_Events_Sync()
         {
@@ -37,6 +38,7 @@ namespace System.Management.Tests
         }
 
         [ConditionalFact(typeof(WmiTestHelper), nameof(WmiTestHelper.IsElevatedAndSupportsWmi))]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34689", TestPlatforms.Windows, TargetFrameworkMonikers.Netcoreapp, TestRuntimes.Mono)]
         [OuterLoop]
         public void Receive_Events_Async()
         {
index e119514..4bd99fb 100644 (file)
@@ -25,6 +25,7 @@ namespace System.Management.Tests
         }
 
         [ConditionalFact(typeof(WmiTestHelper), nameof(WmiTestHelper.IsWmiSupported))]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34689", TestPlatforms.Windows, TargetFrameworkMonikers.Netcoreapp, TestRuntimes.Mono)]
         [OuterLoop]
         public void Related_Instances()
         {
@@ -46,6 +47,7 @@ namespace System.Management.Tests
         }
 
         [ConditionalFact(typeof(WmiTestHelper), nameof(WmiTestHelper.IsWmiSupported))]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34689", TestPlatforms.Windows, TargetFrameworkMonikers.Netcoreapp, TestRuntimes.Mono)]
         [OuterLoop]
         public void Relationship_Classes()
         {
index 747f6ff..bc01fda 100644 (file)
@@ -9,6 +9,7 @@ namespace System.Management.Tests
     public class ManagementObjectSearcherTestsMofRequired
     {
         [ConditionalFact(typeof(WmiTestHelper), nameof(WmiTestHelper.IsElevatedAndSupportsWmi))]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34689", TestPlatforms.Windows, TargetFrameworkMonikers.Netcoreapp, TestRuntimes.Mono)]
         [OuterLoop]
         public void Static_Instances()
         {
@@ -27,6 +28,7 @@ namespace System.Management.Tests
         }
 
         [ConditionalFact(typeof(WmiTestHelper), nameof(WmiTestHelper.IsElevatedAndSupportsWmi))]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34689", TestPlatforms.Windows, TargetFrameworkMonikers.Netcoreapp, TestRuntimes.Mono)]
         [OuterLoop]
         public void Static_Related_Instances()
         {
@@ -44,6 +46,7 @@ namespace System.Management.Tests
         }
 
         [ConditionalFact(typeof(WmiTestHelper), nameof(WmiTestHelper.IsElevatedAndSupportsWmi))]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34689", TestPlatforms.Windows, TargetFrameworkMonikers.Netcoreapp, TestRuntimes.Mono)]
         [OuterLoop]
         public void Static_Relationship_Classes()
         {
index 215ef2b..ccf8154 100644 (file)
@@ -39,6 +39,7 @@ namespace System.Management.Tests
         }
 
         [ConditionalFact(typeof(WmiTestHelper), nameof(WmiTestHelper.IsWmiSupported))]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34689", TestPlatforms.Windows, TargetFrameworkMonikers.Netcoreapp, TestRuntimes.Mono)]
         [OuterLoop]
         public void GetRelated_For_Win32_LogicalDisk()
         {
@@ -63,6 +64,7 @@ namespace System.Management.Tests
         }
 
         [ConditionalFact(typeof(WmiTestHelper), nameof(WmiTestHelper.IsWmiSupported))]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34689", TestPlatforms.Windows, TargetFrameworkMonikers.Netcoreapp, TestRuntimes.Mono)]
         [OuterLoop]
         public void Invoke_Instance_And_Static_Method_Win32_Process()
         {
@@ -101,6 +103,7 @@ namespace System.Management.Tests
         }
 
         [ConditionalFact(typeof(WmiTestHelper), nameof(WmiTestHelper.IsWmiSupported))]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/34689", TestPlatforms.Windows, TargetFrameworkMonikers.Netcoreapp, TestRuntimes.Mono)]
         [OuterLoop]
         public void Serialize_ManagementException()
         {
index 673d0ba..561bd24 100644 (file)
@@ -353,6 +353,7 @@ namespace System.Text.Tests
 
         [Fact]
         [OuterLoop] // this test takes ~10 seconds on modern hardware since it operates over GBs of data
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/79883", TestRuntimes.Mono)]
         public static void GetBytes_Encoding_ReadOnlySequence_IBufferWriter_LargeMultiSegment()
         {
             ReadOnlySequence<char> sequence = GetLargeRepeatingReadOnlySequence<char>(AllScalarsAsUtf16, 1500); // ~ 3.2bn chars of UTF-16 input
index 43b4bb3..49a95c8 100644 (file)
@@ -741,7 +741,7 @@ namespace System.Net.NetworkInformation.Tests
             options.Ttl = 1;
             // This should always fail unless host is one IP hop away.
             pingReply = await ping.SendPingAsync(host, TestSettings.PingTimeout, payload, options);
-            Assert.True(pingReply.Status == IPStatus.TimeExceeded || pingReply.Status == IPStatus.TtlExpired);
+            Assert.True(pingReply.Status == IPStatus.TimeExceeded || pingReply.Status == IPStatus.TtlExpired, $"pingReply.Status was {pingReply.Status} instead of TimeExceeded or TtlExpired");
             Assert.NotEqual(IPAddress.Any, pingReply.Address);
         }
 
index f9ed70b..207faa6 100644 (file)
@@ -368,6 +368,7 @@ namespace System.Tests
         [InlineData(Environment.SpecialFolder.MyPictures)]
         [InlineData(Environment.SpecialFolder.MyVideos)]
         [InlineData(Environment.SpecialFolder.Templates)]
+        [SkipOnPlatform(TestPlatforms.iOS | TestPlatforms.tvOS | TestPlatforms.Android | TestPlatforms.Browser, "Not supported on iOS/tvOS/Android/Browser.")]
         public void GetFolderPath_Unix_SpecialFolderDoesNotExist_CreatesSuccessfully(Environment.SpecialFolder folder)
         {
             string path = Environment.GetFolderPath(folder, Environment.SpecialFolderOption.DoNotVerify);
index a3df88e..cfed8bd 100644 (file)
@@ -500,6 +500,7 @@ namespace System.Numerics.Tests
 
         [ConditionalFact(typeof(PlatformDetection), nameof(PlatformDetection.Is64BitProcess))] // Requires a lot of memory
         [OuterLoop("Takes a long time, allocates a lot of memory")]
+        [SkipOnMono("Frequently throws OOM on Mono")]
         public static void ToString_ValidLargeFormat()
         {
             BigInteger b = new BigInteger(123456789000m);
index edb7155..7f09dd6 100644 (file)
@@ -848,6 +848,7 @@ namespace System.Tests
 
         [ConditionalFact(typeof(PlatformDetection), nameof(PlatformDetection.Is64BitProcess))] // Requires a lot of memory
         [OuterLoop("Takes a long time, allocates a lot of memory")]
+        [SkipOnMono("Frequently throws OOM on Mono")]
         public static void ToString_ValidLargeFormat()
         {
             double d = 123.0;
index 7b979c2..bca6384 100644 (file)
@@ -559,7 +559,7 @@ namespace System.Security.Cryptography.Pkcs.EnvelopedCmsTests.Tests
             VerifySimpleDecrypt(encodedMessage, certLoader, expectedContentInfo);
         }
 
-        [Fact]
+        [ConditionalFact(typeof(PlatformSupport), nameof(PlatformSupport.IsRC2Supported))]
         [OuterLoop(/* Leaks key on disk if interrupted */)]
         public void TestDecryptSimpleAes256_RsaOaepSha256()
         {
@@ -580,7 +580,7 @@ namespace System.Security.Cryptography.Pkcs.EnvelopedCmsTests.Tests
             VerifySimpleDecrypt(encodedMessage, Certificates.RSASha256KeyTransfer1, expectedContentInfo);
         }
 
-        [Fact]
+        [ConditionalFact(typeof(PlatformSupport), nameof(PlatformSupport.IsRC2Supported))]
         [OuterLoop(/* Leaks key on disk if interrupted */)]
         public void TestDecryptSimpleAes256_RsaOaepSha384()
         {
@@ -603,7 +603,7 @@ namespace System.Security.Cryptography.Pkcs.EnvelopedCmsTests.Tests
             VerifySimpleDecrypt(encodedMessage, Certificates.RSA2048Sha256KeyTransfer1, expectedContentInfo);
         }
 
-        [Fact]
+        [ConditionalFact(typeof(PlatformSupport), nameof(PlatformSupport.IsRC2Supported))]
         [OuterLoop(/* Leaks key on disk if interrupted */)]
         public void TestDecryptSimpleAes256_RsaOaepSha512()
         {
index a19967c..0d6a5ea 100644 (file)
@@ -6,6 +6,8 @@ using System.Security.Cryptography.Pkcs.Tests;
 using System.Security.Cryptography.X509Certificates;
 using Xunit;
 
+using Test.Cryptography;
+
 namespace System.Security.Cryptography.Pkcs.EnvelopedCmsTests.Tests
 {
     public class DecryptTestsRsaPaddingMode : DecryptTests
@@ -16,7 +18,7 @@ namespace System.Security.Cryptography.Pkcs.EnvelopedCmsTests.Tests
         {
         }
 
-        [Theory]
+        [ConditionalTheory(typeof(PlatformSupport), nameof(PlatformSupport.IsRC2Supported))]
         [MemberData(nameof(Roundtrip_RsaPaddingModes_TestData))]
         [OuterLoop(/* Leaks key on disk if interrupted */)]
         public static void Roundtrip_RsaPaddingModes(RSAEncryptionPadding rsaEncryptionPadding)
index 5dd25c3..a1ecb9a 100644 (file)
@@ -28,6 +28,7 @@ public class WindowsIdentityImpersonatedTests : IClassFixture<WindowsIdentityFix
 
     [ConditionalFact(typeof(PlatformDetection), nameof(PlatformDetection.CanRunImpersonatedTests))]
     [OuterLoop]
+    [ActiveIssue("https://github.com/dotnet/runtime/issues/80019", TestRuntimes.Mono)]
     public async Task RunImpersonatedAsync_TaskAndTaskOfT()
     {
         using WindowsIdentity currentWindowsIdentity = WindowsIdentity.GetCurrent();
@@ -69,6 +70,7 @@ public class WindowsIdentityImpersonatedTests : IClassFixture<WindowsIdentityFix
 
     [ConditionalFact(typeof(PlatformDetection), nameof(PlatformDetection.CanRunImpersonatedTests))]
     [OuterLoop]
+    [ActiveIssue("https://github.com/dotnet/runtime/issues/80019", TestRuntimes.Mono)]
     public void RunImpersonated_NameResolution()
     {
         using WindowsIdentity currentWindowsIdentity = WindowsIdentity.GetCurrent();
@@ -90,6 +92,7 @@ public class WindowsIdentityImpersonatedTests : IClassFixture<WindowsIdentityFix
 
     [ConditionalFact(typeof(PlatformDetection), nameof(PlatformDetection.CanRunImpersonatedTests))]
     [OuterLoop]
+    [ActiveIssue("https://github.com/dotnet/runtime/issues/80019", TestRuntimes.Mono)]
     public async Task RunImpersonatedAsync_NameResolution()
     {
         using WindowsIdentity currentWindowsIdentity = WindowsIdentity.GetCurrent();
index 7b87042..76a00b6 100644 (file)
@@ -113,6 +113,7 @@ namespace System.Text.Json.Serialization.Tests
         [InlineData(5000, 1000, false)]
         [InlineData(1000, 10_000, true)]
         [InlineData(1000, 10_000, false)]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/80020", TestRuntimes.Mono)]
         public async Task WriteAsyncEnumerable_LongRunningEnumeration_Cancellation(
             int cancellationTokenSourceDelayMilliseconds,
             int enumeratorDelayMilliseconds,
index de5ab8b..cf05d3a 100644 (file)
@@ -11,6 +11,7 @@ namespace System.Text.Json.Serialization.Tests
     {
         [Fact]
         [OuterLoop]
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/80020", TestRuntimes.Mono)]
         public async Task MultipleThreadsLooping()
         {
             const int Iterations = 100;
index 16e333a..4cf860e 100644 (file)
@@ -1551,7 +1551,8 @@ namespace System.Text.RegularExpressions.Tests
         }
 
         [OuterLoop("Takes minutes to generate and compile thousands of expressions")]
-        [ConditionalFact(typeof(PlatformDetection), nameof(PlatformDetection.Is64BitProcess))] // consumes a lot of memory
+        [ConditionalFact(typeof(PlatformDetection), nameof(PlatformDetection.Is64BitProcess), nameof(PlatformDetection.IsNotMobile), nameof(PlatformDetection.IsNotBrowser))] // consumes a lot of memory, doesn't work on mobile
+        [ActiveIssue("https://github.com/dotnet/runtime/issues/80018", TestRuntimes.Mono)]
         public void PatternsDataSet_ConstructRegexForAll_SourceGenerated()
         {
             Parallel.ForEach(s_patternsDataSet.Value.Chunk(50), chunk =>
index a93121d..d3e2d45 100644 (file)
@@ -9,6 +9,7 @@ using System.Threading;
 using System.Threading.Tasks;
 using System.Tests;
 using Microsoft.DotNet.RemoteExecutor;
+using Microsoft.DotNet.XUnitExtensions;
 using Xunit;
 using Xunit.Sdk;
 
@@ -1100,7 +1101,7 @@ namespace System.Text.RegularExpressions.Tests
 
         [SkipOnTargetFramework(TargetFrameworkMonikers.NetFramework, "Takes several minutes on .NET Framework")]
         [OuterLoop("Takes several seconds")]
-        [Theory]
+        [ConditionalTheory]
         [MemberData(nameof(RegexHelpers.AvailableEngines_MemberData), MemberType = typeof(RegexHelpers))]
         public async Task Match_VaryingLengthStrings_Huge(RegexEngine engine)
         {
@@ -1128,6 +1129,11 @@ namespace System.Text.RegularExpressions.Tests
 
             if (RegexHelpers.IsNonBacktracking(engine))
             {
+                if (!RemoteExecutor.IsSupported)
+                {
+                    throw new SkipTestException("RemoteExecutor is not supported on this platform.");
+                }
+
                 RemoteExecutor.Invoke(func, engine.ToString()).Dispose();
             }
             else
@@ -2116,7 +2122,7 @@ namespace System.Text.RegularExpressions.Tests
         }
 
         [OuterLoop("Can take over a minute")]
-        [Theory]
+        [ConditionalTheory]
         [MemberData(nameof(StressTestDeepNestingOfConcat_TestData))]
         public async Task StressTestDeepNestingOfConcat(RegexEngine engine, string pattern, string anchor, string input, int pattern_repetition, int input_repetition)
         {
@@ -2150,6 +2156,11 @@ namespace System.Text.RegularExpressions.Tests
 
             if (RegexHelpers.IsNonBacktracking(engine))
             {
+                if (!RemoteExecutor.IsSupported)
+                {
+                    throw new SkipTestException("RemoteExecutor is not supported on this platform.");
+                }
+
                 RemoteExecutor.Invoke(func, engine.ToString(), fullpattern, fullinput).Dispose();
             }
             else
@@ -2207,6 +2218,11 @@ namespace System.Text.RegularExpressions.Tests
 
             if (RegexHelpers.IsNonBacktracking(engine))
             {
+                if (!RemoteExecutor.IsSupported)
+                {
+                    throw new SkipTestException("RemoteExecutor is not supported on this platform.");
+                }
+
                 RemoteExecutor.Invoke(func, engine.ToString(), fullpattern, fullinput).Dispose();
             }
             else
index 6262bb3..cf9a083 100644 (file)
@@ -131,7 +131,7 @@ namespace System.Text.RegularExpressions.Tests
             Assert.True(regex.IsMatch("iI"));
         }
 
-        [Fact]
+        [ConditionalFact(typeof(PlatformDetection), nameof(PlatformDetection.IsNotMobile), nameof(PlatformDetection.IsNotBrowser))]
         // This test creates a source generated engine for each of the ~870 cultures and ensures the result compiles. This test alone takes around 30
         // seconds on a fast machine, so marking as OuterLoop.
         [OuterLoop]
index f664245..8bf53d4 100644 (file)
@@ -40,7 +40,7 @@
     <_workItemTimeout Condition="'$(_workItemTimeout)' == '' and ('$(TargetOS)' == 'ios' or '$(TargetOS)' == 'tvos')">00:45:00</_workItemTimeout>
     <_workItemTimeout Condition="'$(Scenario)' == '' and '$(_workItemTimeout)' == '' and ('$(TargetArchitecture)' == 'arm64' or '$(TargetArchitecture)' == 'arm')">00:45:00</_workItemTimeout>
     <_workItemTimeout Condition="'$(Scenario)' != '' and '$(_workItemTimeout)' == '' and ('$(TargetArchitecture)' == 'arm64' or '$(TargetArchitecture)' == 'arm')">01:00:00</_workItemTimeout>
-    <_workItemTimeout Condition="'$(Scenario)' == '' and '$(_workItemTimeout)' == '' and '$(Outerloop)' == 'true'">00:20:00</_workItemTimeout>
+    <_workItemTimeout Condition="'$(Scenario)' == '' and '$(_workItemTimeout)' == '' and ('$(TestScope)' == 'outerloop' or '$(TestScope)' == 'all')">00:20:00</_workItemTimeout>
     <_workItemTimeout Condition="'$(Scenario)' == '' and '$(_workItemTimeout)' == ''">00:15:00</_workItemTimeout>
     <_workItemTimeout Condition="'$(Scenario)' != '' and '$(_workItemTimeout)' == ''">00:30:00</_workItemTimeout>
   </PropertyGroup>