[INFO] cloning repository https://github.com/remolueoend/secure-env [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/remolueoend/secure-env" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fremolueoend%2Fsecure-env", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fremolueoend%2Fsecure-env'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] 5ba7521d9cef47a6171c0e12bd4d4fc1e3f8fb52 [INFO] testing remolueoend/secure-env against 1.45.2 for beta-1.46-1 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fremolueoend%2Fsecure-env" "/workspace/builds/worker-1/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-1/source'... [INFO] [stderr] done. [INFO] validating manifest of git repo https://github.com/remolueoend/secure-env on toolchain 1.45.2 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+1.45.2" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking git repo https://github.com/remolueoend/secure-env [INFO] finished tweaking git repo https://github.com/remolueoend/secure-env [INFO] tweaked toml for git repo https://github.com/remolueoend/secure-env written to /workspace/builds/worker-1/source/Cargo.toml [INFO] crate git repo https://github.com/remolueoend/secure-env already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+1.45.2" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+1.45.2" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] 2a1d0d69dcae6a39a75996169bc91b938ef7fb9a383a9c4130fbef701d260651 [INFO] running `Command { std: "docker" "start" "-a" "2a1d0d69dcae6a39a75996169bc91b938ef7fb9a383a9c4130fbef701d260651", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "2a1d0d69dcae6a39a75996169bc91b938ef7fb9a383a9c4130fbef701d260651", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "2a1d0d69dcae6a39a75996169bc91b938ef7fb9a383a9c4130fbef701d260651", kill_on_drop: false }` [INFO] [stdout] 2a1d0d69dcae6a39a75996169bc91b938ef7fb9a383a9c4130fbef701d260651 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+1.45.2" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] 351be76641a47a594c0270130f6b991da42f42862adabeb0c2c7d800031f0b87 [INFO] running `Command { std: "docker" "start" "-a" "351be76641a47a594c0270130f6b991da42f42862adabeb0c2c7d800031f0b87", kill_on_drop: false }` [INFO] [stderr] Compiling serde v1.0.92 [INFO] [stderr] Compiling vec_map v0.8.1 [INFO] [stderr] Compiling textwrap v0.11.0 [INFO] [stderr] Compiling atty v0.2.11 [INFO] [stderr] Compiling clap v2.33.0 [INFO] [stderr] Compiling toml v0.5.1 [INFO] [stderr] Compiling secure_env v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused variable: `process` [INFO] [stdout] --> src/start_command.rs:16:9 [INFO] [stdout] | [INFO] [stdout] 16 | let process = Command::new(name).envs(&env_vars).spawn()?; [INFO] [stdout] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_process` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/main.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 29 | start_command(start_args.value_of("PROCESS").unwrap(), &pass); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_must_use)]` on by default [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 25.82s [INFO] running `Command { std: "docker" "inspect" "351be76641a47a594c0270130f6b991da42f42862adabeb0c2c7d800031f0b87", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "351be76641a47a594c0270130f6b991da42f42862adabeb0c2c7d800031f0b87", kill_on_drop: false }` [INFO] [stdout] 351be76641a47a594c0270130f6b991da42f42862adabeb0c2c7d800031f0b87 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+1.45.2" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 3dd37132a415f26e2d6bea075abf6dacb949875e2512060e6228b1c7b7145de6 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "3dd37132a415f26e2d6bea075abf6dacb949875e2512060e6228b1c7b7145de6", kill_on_drop: false }` [INFO] [stderr] Compiling secure_env v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused variable: `process` [INFO] [stdout] --> src/start_command.rs:16:9 [INFO] [stdout] | [INFO] [stdout] 16 | let process = Command::new(name).envs(&env_vars).spawn()?; [INFO] [stdout] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_process` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `process` [INFO] [stdout] --> src/start_command.rs:16:9 [INFO] [stdout] | [INFO] [stdout] 16 | let process = Command::new(name).envs(&env_vars).spawn()?; [INFO] [stdout] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_process` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/main.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 29 | start_command(start_args.value_of("PROCESS").unwrap(), &pass); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_must_use)]` on by default [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 0.89s [INFO] running `Command { std: "docker" "inspect" "3dd37132a415f26e2d6bea075abf6dacb949875e2512060e6228b1c7b7145de6", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "3dd37132a415f26e2d6bea075abf6dacb949875e2512060e6228b1c7b7145de6", kill_on_drop: false }` [INFO] [stdout] 3dd37132a415f26e2d6bea075abf6dacb949875e2512060e6228b1c7b7145de6 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+1.45.2" "test" "--frozen", kill_on_drop: false }` [INFO] [stdout] 7f9e1c5d01c291d7f428228e82d5db5226b00a2e2ae05e2523137b09f3f0a104 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "7f9e1c5d01c291d7f428228e82d5db5226b00a2e2ae05e2523137b09f3f0a104", kill_on_drop: false }` [INFO] [stderr] warning: unused variable: `process` [INFO] [stderr] --> src/start_command.rs:16:9 [INFO] [stderr] | [INFO] [stderr] 16 | let process = Command::new(name).envs(&env_vars).spawn()?; [INFO] [stderr] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_process` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` on by default [INFO] [stderr] [INFO] [stderr] warning: 1 warning emitted [INFO] [stderr] [INFO] [stderr] warning: unused variable: `process` [INFO] [stderr] --> src/start_command.rs:16:9 [INFO] [stderr] | [INFO] [stderr] 16 | let process = Command::new(name).envs(&env_vars).spawn()?; [INFO] [stderr] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_process` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` on by default [INFO] [stderr] [INFO] [stderr] warning: 1 warning emitted [INFO] [stderr] [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/main.rs:29:9 [INFO] [stderr] | [INFO] [stderr] 29 | start_command(start_args.value_of("PROCESS").unwrap(), &pass); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_must_use)]` on by default [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] [INFO] [stderr] warning: 1 warning emitted [INFO] [stderr] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 0.08s [INFO] [stderr] Running /opt/rustwide/target/debug/deps/secure_env-8574c7f95013e516 [INFO] [stdout] [INFO] [stderr] Running /opt/rustwide/target/debug/deps/secure_env-765e4c73390ed552 [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out [INFO] [stdout] [INFO] [stderr] Doc-tests secure_env [INFO] [stdout] [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "7f9e1c5d01c291d7f428228e82d5db5226b00a2e2ae05e2523137b09f3f0a104", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "7f9e1c5d01c291d7f428228e82d5db5226b00a2e2ae05e2523137b09f3f0a104", kill_on_drop: false }` [INFO] [stdout] 7f9e1c5d01c291d7f428228e82d5db5226b00a2e2ae05e2523137b09f3f0a104