[INFO] crate ssearch 0.2.0 is already in cache [INFO] testing ssearch-0.2.0 against beta-2020-06-03 for beta-1.45-1 [INFO] extracting crate ssearch 0.2.0 into /workspace/builds/worker-2/source [INFO] validating manifest of crates.io crate ssearch 0.2.0 on toolchain beta-2020-06-03 [INFO] running `"/workspace/cargo-home/bin/cargo" "+beta-2020-06-03" "read-manifest" "--manifest-path" "Cargo.toml"` [INFO] started tweaking crates.io crate ssearch 0.2.0 [INFO] finished tweaking crates.io crate ssearch 0.2.0 [INFO] tweaked toml for crates.io crate ssearch 0.2.0 written to /workspace/builds/worker-2/source/Cargo.toml [INFO] running `"/workspace/cargo-home/bin/cargo" "+beta-2020-06-03" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update"` [INFO] running `"/workspace/cargo-home/bin/cargo" "+beta-2020-06-03" "fetch" "--locked" "--manifest-path" "Cargo.toml"` [INFO] running `"docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2020-06-03" "build" "--frozen"` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] 585140e2636264b25277c7074496fbec37105a1c8d3925b7679fae81ffb13bc8 [INFO] running `"docker" "start" "-a" "585140e2636264b25277c7074496fbec37105a1c8d3925b7679fae81ffb13bc8"` [INFO] [stderr] sudo: setrlimit(RLIMIT_CORE): Operation not permitted [INFO] [stderr] Compiling memchr v2.3.3 [INFO] [stderr] Compiling encode_unicode v0.3.6 [INFO] [stderr] Compiling opener v0.4.1 [INFO] [stderr] Compiling regex-automata v0.1.9 [INFO] [stderr] Compiling term v0.5.2 [INFO] [stderr] Compiling serde_json v1.0.53 [INFO] [stderr] Compiling csv-core v0.1.10 [INFO] [stderr] Compiling bstr v0.2.13 [INFO] [stderr] Compiling csv v1.1.3 [INFO] [stderr] Compiling prettytable-rs v0.8.0 [INFO] [stderr] Compiling ssearch v0.2.0 (/opt/rustwide/workdir) [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/main.rs:181:5 [INFO] [stderr] | [INFO] [stderr] 181 | opener::open(link.as_str()); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_must_use)]` on by default [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/persistence.rs:1:804 [INFO] [stderr] | [INFO] [stderr] 1 | use std::fs::{File, OpenOptions};use std::fs;use std::io::BufReader;use std::path::{Path, PathBuf};use serde_json;use crate::search::Search;static FILE_NAME: &str = "ssearch.json";fn get_location() -> Box { Box::new(dirs::home_dir().unwrap().join(".ssearch").join(FILE_NAME))}pub trait Persistence { fn write(t: &[T]) -> PersistenceResult; fn load() -> Vec; fn is_already_exits() -> bool; fn update(t: Search) -> PersistenceResult; fn remove(kw: String) -> PersistenceResult;}pub struct FileBasedSearchPersistence;#[derive(PartialEq)]pub enum PersistenceResult { Created, Updated, Deleted, Error, Nothing,}impl Persistence for FileBasedSearchPersistence { fn write(t: &[Search]) -> PersistenceResult { fs::create_dir(get_location().as_path().parent().unwrap()); let file = OpenOptions::new() .create(true) .read(true) .write(true) .truncate(true) .open(get_location().as_path()); if file.is_err() { return PersistenceResult::Error; } let result = serde_json::to_writer(&file.unwrap(), t); if result.is_ok() { result.unwrap(); return PersistenceResult::Created; } return PersistenceResult::Error; } fn load() -> Vec { let file = File::open(get_location().as_path()).unwrap(); let read = serde_json::from_reader(BufReader::new(file)).unwrap(); return serde_json::from_value(read).unwrap(); } fn is_already_exits() -> bool { return Path::exists(get_location().as_path().parent().unwrap()); } fn update(t: Search) -> PersistenceResult { let mut contents = FileBasedSearchPersistence::load(); let original_size = contents.len(); contents.retain(|x| *x != t); if contents.len() < original_size { return PersistenceResult::Updated; } contents.push(t); FileBasedSearchPersistence::write(&contents); return PersistenceResult::Created; } fn remove(kw: String) -> PersistenceResult { let mut contents = FileBasedSearchPersistence::load(); let original_size = contents.len(); contents.retain(|x| x.keyword != kw); if original_size == contents.len() { return PersistenceResult::Nothing; } FileBasedSearchPersistence::write(&contents); return PersistenceResult::Deleted; }} [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] [INFO] [stderr] warning: 2 warnings emitted [INFO] [stderr] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 17.32s [INFO] running `"docker" "inspect" "585140e2636264b25277c7074496fbec37105a1c8d3925b7679fae81ffb13bc8"` [INFO] running `"docker" "rm" "-f" "585140e2636264b25277c7074496fbec37105a1c8d3925b7679fae81ffb13bc8"` [INFO] [stdout] 585140e2636264b25277c7074496fbec37105a1c8d3925b7679fae81ffb13bc8 [INFO] running `"docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2020-06-03" "test" "--frozen" "--no-run"` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] e27560d7ee8f905da8c0dfbea692791367fca1f9a4d756f423126a051110ef12 [INFO] running `"docker" "start" "-a" "e27560d7ee8f905da8c0dfbea692791367fca1f9a4d756f423126a051110ef12"` [INFO] [stderr] sudo: setrlimit(RLIMIT_CORE): Operation not permitted [INFO] [stderr] Compiling ssearch v0.2.0 (/opt/rustwide/workdir) [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/main.rs:181:5 [INFO] [stderr] | [INFO] [stderr] 181 | opener::open(link.as_str()); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_must_use)]` on by default [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/persistence.rs:1:804 [INFO] [stderr] | [INFO] [stderr] 1 | use std::fs::{File, OpenOptions};use std::fs;use std::io::BufReader;use std::path::{Path, PathBuf};use serde_json;use crate::search::Search;static FILE_NAME: &str = "ssearch.json";fn get_location() -> Box { Box::new(dirs::home_dir().unwrap().join(".ssearch").join(FILE_NAME))}pub trait Persistence { fn write(t: &[T]) -> PersistenceResult; fn load() -> Vec; fn is_already_exits() -> bool; fn update(t: Search) -> PersistenceResult; fn remove(kw: String) -> PersistenceResult;}pub struct FileBasedSearchPersistence;#[derive(PartialEq)]pub enum PersistenceResult { Created, Updated, Deleted, Error, Nothing,}impl Persistence for FileBasedSearchPersistence { fn write(t: &[Search]) -> PersistenceResult { fs::create_dir(get_location().as_path().parent().unwrap()); let file = OpenOptions::new() .create(true) .read(true) .write(true) .truncate(true) .open(get_location().as_path()); if file.is_err() { return PersistenceResult::Error; } let result = serde_json::to_writer(&file.unwrap(), t); if result.is_ok() { result.unwrap(); return PersistenceResult::Created; } return PersistenceResult::Error; } fn load() -> Vec { let file = File::open(get_location().as_path()).unwrap(); let read = serde_json::from_reader(BufReader::new(file)).unwrap(); return serde_json::from_value(read).unwrap(); } fn is_already_exits() -> bool { return Path::exists(get_location().as_path().parent().unwrap()); } fn update(t: Search) -> PersistenceResult { let mut contents = FileBasedSearchPersistence::load(); let original_size = contents.len(); contents.retain(|x| *x != t); if contents.len() < original_size { return PersistenceResult::Updated; } contents.push(t); FileBasedSearchPersistence::write(&contents); return PersistenceResult::Created; } fn remove(kw: String) -> PersistenceResult { let mut contents = FileBasedSearchPersistence::load(); let original_size = contents.len(); contents.retain(|x| x.keyword != kw); if original_size == contents.len() { return PersistenceResult::Nothing; } FileBasedSearchPersistence::write(&contents); return PersistenceResult::Deleted; }} [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] [INFO] [stderr] warning: 2 warnings emitted [INFO] [stderr] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 1.09s [INFO] running `"docker" "inspect" "e27560d7ee8f905da8c0dfbea692791367fca1f9a4d756f423126a051110ef12"` [INFO] running `"docker" "rm" "-f" "e27560d7ee8f905da8c0dfbea692791367fca1f9a4d756f423126a051110ef12"` [INFO] [stdout] e27560d7ee8f905da8c0dfbea692791367fca1f9a4d756f423126a051110ef12 [INFO] running `"docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2020-06-03" "test" "--frozen"` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] 07b56bdfc8acc7b77ecb6420dff5496c0c293aa487ae4ddec229581e59de7a3f [INFO] running `"docker" "start" "-a" "07b56bdfc8acc7b77ecb6420dff5496c0c293aa487ae4ddec229581e59de7a3f"` [INFO] [stderr] sudo: setrlimit(RLIMIT_CORE): Operation not permitted [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/main.rs:181:5 [INFO] [stderr] | [INFO] [stderr] 181 | opener::open(link.as_str()); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_must_use)]` on by default [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/persistence.rs:1:804 [INFO] [stderr] | [INFO] [stderr] 1 | use std::fs::{File, OpenOptions};use std::fs;use std::io::BufReader;use std::path::{Path, PathBuf};use serde_json;use crate::search::Search;static FILE_NAME: &str = "ssearch.json";fn get_location() -> Box { Box::new(dirs::home_dir().unwrap().join(".ssearch").join(FILE_NAME))}pub trait Persistence { fn write(t: &[T]) -> PersistenceResult; fn load() -> Vec; fn is_already_exits() -> bool; fn update(t: Search) -> PersistenceResult; fn remove(kw: String) -> PersistenceResult;}pub struct FileBasedSearchPersistence;#[derive(PartialEq)]pub enum PersistenceResult { Created, Updated, Deleted, Error, Nothing,}impl Persistence for FileBasedSearchPersistence { fn write(t: &[Search]) -> PersistenceResult { fs::create_dir(get_location().as_path().parent().unwrap()); let file = OpenOptions::new() .create(true) .read(true) .write(true) .truncate(true) .open(get_location().as_path()); if file.is_err() { return PersistenceResult::Error; } let result = serde_json::to_writer(&file.unwrap(), t); if result.is_ok() { result.unwrap(); return PersistenceResult::Created; } return PersistenceResult::Error; } fn load() -> Vec { let file = File::open(get_location().as_path()).unwrap(); let read = serde_json::from_reader(BufReader::new(file)).unwrap(); return serde_json::from_value(read).unwrap(); } fn is_already_exits() -> bool { return Path::exists(get_location().as_path().parent().unwrap()); } fn update(t: Search) -> PersistenceResult { let mut contents = FileBasedSearchPersistence::load(); let original_size = contents.len(); contents.retain(|x| *x != t); if contents.len() < original_size { return PersistenceResult::Updated; } contents.push(t); FileBasedSearchPersistence::write(&contents); return PersistenceResult::Created; } fn remove(kw: String) -> PersistenceResult { let mut contents = FileBasedSearchPersistence::load(); let original_size = contents.len(); contents.retain(|x| x.keyword != kw); if original_size == contents.len() { return PersistenceResult::Nothing; } FileBasedSearchPersistence::write(&contents); return PersistenceResult::Deleted; }} [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] [INFO] [stderr] warning: 2 warnings emitted [INFO] [stderr] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 0.10s [INFO] [stderr] Running /opt/rustwide/target/debug/deps/ssearch-61be276999ce3bb7 [INFO] [stdout] [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out [INFO] [stdout] [INFO] running `"docker" "inspect" "07b56bdfc8acc7b77ecb6420dff5496c0c293aa487ae4ddec229581e59de7a3f"` [INFO] running `"docker" "rm" "-f" "07b56bdfc8acc7b77ecb6420dff5496c0c293aa487ae4ddec229581e59de7a3f"` [INFO] [stdout] 07b56bdfc8acc7b77ecb6420dff5496c0c293aa487ae4ddec229581e59de7a3f