[INFO] crate ssearch 0.2.0 is already in cache [INFO] testing ssearch-0.2.0 against 1.45.2 for beta-1.46-1 [INFO] extracting crate ssearch 0.2.0 into /workspace/builds/worker-8/source [INFO] validating manifest of crates.io crate ssearch 0.2.0 on toolchain 1.45.2 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+1.45.2" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking crates.io crate ssearch 0.2.0 [INFO] finished tweaking crates.io crate ssearch 0.2.0 [INFO] tweaked toml for crates.io crate ssearch 0.2.0 written to /workspace/builds/worker-8/source/Cargo.toml [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+1.45.2" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update", kill_on_drop: false }` [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+1.45.2" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+1.45.2" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] c6bdff4f9dced734ef3d88307b3f2dc6bf14a09aaa650fdefa1d9ddc72b5d00f [INFO] running `Command { std: "docker" "start" "-a" "c6bdff4f9dced734ef3d88307b3f2dc6bf14a09aaa650fdefa1d9ddc72b5d00f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "c6bdff4f9dced734ef3d88307b3f2dc6bf14a09aaa650fdefa1d9ddc72b5d00f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "c6bdff4f9dced734ef3d88307b3f2dc6bf14a09aaa650fdefa1d9ddc72b5d00f", kill_on_drop: false }` [INFO] [stdout] c6bdff4f9dced734ef3d88307b3f2dc6bf14a09aaa650fdefa1d9ddc72b5d00f [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+1.45.2" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 6d97f6c716275e7d1ca679d3d0fdc3bf1a1825fd0343635fe17d62b94db92d8a [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "6d97f6c716275e7d1ca679d3d0fdc3bf1a1825fd0343635fe17d62b94db92d8a", kill_on_drop: false }` [INFO] [stderr] Compiling opener v0.4.1 [INFO] [stderr] Compiling bstr v0.2.13 [INFO] [stderr] Compiling csv v1.1.3 [INFO] [stderr] Compiling prettytable-rs v0.8.0 [INFO] [stderr] Compiling ssearch v0.2.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/main.rs:181:5 [INFO] [stdout] | [INFO] [stdout] 181 | opener::open(link.as_str()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_must_use)]` on by default [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/persistence.rs:1:804 [INFO] [stdout] | [INFO] [stdout] 1 | use std::fs::{File, OpenOptions};use std::fs;use std::io::BufReader;use std::path::{Path, PathBuf};use serde_json;use crate::search::Search;static FILE_NAME: &str = "ssearch.json";fn get_location() -> Box { Box::new(dirs::home_dir().unwrap().join(".ssearch").join(FILE_NAME))}pub trait Persistence { fn write(t: &[T]) -> PersistenceResult; fn load() -> Vec; fn is_already_exits() -> bool; fn update(t: Search) -> PersistenceResult; fn remove(kw: String) -> PersistenceResult;}pub struct FileBasedSearchPersistence;#[derive(PartialEq)]pub enum PersistenceResult { Created, Updated, Deleted, Error, Nothing,}impl Persistence for FileBasedSearchPersistence { fn write(t: &[Search]) -> PersistenceResult { fs::create_dir(get_location().as_path().parent().unwrap()); let file = OpenOptions::new() .create(true) .read(true) .write(true) .truncate(true) .open(get_location().as_path()); if file.is_err() { return PersistenceResult::Error; } let result = serde_json::to_writer(&file.unwrap(), t); if result.is_ok() { result.unwrap(); return PersistenceResult::Created; } return PersistenceResult::Error; } fn load() -> Vec { let file = File::open(get_location().as_path()).unwrap(); let read = serde_json::from_reader(BufReader::new(file)).unwrap(); return serde_json::from_value(read).unwrap(); } fn is_already_exits() -> bool { return Path::exists(get_location().as_path().parent().unwrap()); } fn update(t: Search) -> PersistenceResult { let mut contents = FileBasedSearchPersistence::load(); let original_size = contents.len(); contents.retain(|x| *x != t); if contents.len() < original_size { return PersistenceResult::Updated; } contents.push(t); FileBasedSearchPersistence::write(&contents); return PersistenceResult::Created; } fn remove(kw: String) -> PersistenceResult { let mut contents = FileBasedSearchPersistence::load(); let original_size = contents.len(); contents.retain(|x| x.keyword != kw); if original_size == contents.len() { return PersistenceResult::Nothing; } FileBasedSearchPersistence::write(&contents); return PersistenceResult::Deleted; }} [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 2 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 11.17s [INFO] running `Command { std: "docker" "inspect" "6d97f6c716275e7d1ca679d3d0fdc3bf1a1825fd0343635fe17d62b94db92d8a", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "6d97f6c716275e7d1ca679d3d0fdc3bf1a1825fd0343635fe17d62b94db92d8a", kill_on_drop: false }` [INFO] [stdout] 6d97f6c716275e7d1ca679d3d0fdc3bf1a1825fd0343635fe17d62b94db92d8a [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+1.45.2" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 2e6863830bc0191d444d5045541b302417da22571ad059b298895170cb0f6909 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "2e6863830bc0191d444d5045541b302417da22571ad059b298895170cb0f6909", kill_on_drop: false }` [INFO] [stderr] Compiling ssearch v0.2.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/main.rs:181:5 [INFO] [stdout] | [INFO] [stdout] 181 | opener::open(link.as_str()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_must_use)]` on by default [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `std::result::Result` that must be used [INFO] [stdout] --> src/persistence.rs:1:804 [INFO] [stdout] | [INFO] [stdout] 1 | use std::fs::{File, OpenOptions};use std::fs;use std::io::BufReader;use std::path::{Path, PathBuf};use serde_json;use crate::search::Search;static FILE_NAME: &str = "ssearch.json";fn get_location() -> Box { Box::new(dirs::home_dir().unwrap().join(".ssearch").join(FILE_NAME))}pub trait Persistence { fn write(t: &[T]) -> PersistenceResult; fn load() -> Vec; fn is_already_exits() -> bool; fn update(t: Search) -> PersistenceResult; fn remove(kw: String) -> PersistenceResult;}pub struct FileBasedSearchPersistence;#[derive(PartialEq)]pub enum PersistenceResult { Created, Updated, Deleted, Error, Nothing,}impl Persistence for FileBasedSearchPersistence { fn write(t: &[Search]) -> PersistenceResult { fs::create_dir(get_location().as_path().parent().unwrap()); let file = OpenOptions::new() .create(true) .read(true) .write(true) .truncate(true) .open(get_location().as_path()); if file.is_err() { return PersistenceResult::Error; } let result = serde_json::to_writer(&file.unwrap(), t); if result.is_ok() { result.unwrap(); return PersistenceResult::Created; } return PersistenceResult::Error; } fn load() -> Vec { let file = File::open(get_location().as_path()).unwrap(); let read = serde_json::from_reader(BufReader::new(file)).unwrap(); return serde_json::from_value(read).unwrap(); } fn is_already_exits() -> bool { return Path::exists(get_location().as_path().parent().unwrap()); } fn update(t: Search) -> PersistenceResult { let mut contents = FileBasedSearchPersistence::load(); let original_size = contents.len(); contents.retain(|x| *x != t); if contents.len() < original_size { return PersistenceResult::Updated; } contents.push(t); FileBasedSearchPersistence::write(&contents); return PersistenceResult::Created; } fn remove(kw: String) -> PersistenceResult { let mut contents = FileBasedSearchPersistence::load(); let original_size = contents.len(); contents.retain(|x| x.keyword != kw); if original_size == contents.len() { return PersistenceResult::Nothing; } FileBasedSearchPersistence::write(&contents); return PersistenceResult::Deleted; }} [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 2 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 1.48s [INFO] running `Command { std: "docker" "inspect" "2e6863830bc0191d444d5045541b302417da22571ad059b298895170cb0f6909", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "2e6863830bc0191d444d5045541b302417da22571ad059b298895170cb0f6909", kill_on_drop: false }` [INFO] [stdout] 2e6863830bc0191d444d5045541b302417da22571ad059b298895170cb0f6909 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-8/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+1.45.2" "test" "--frozen", kill_on_drop: false }` [INFO] [stdout] 0ea98503177ca3420daa6c62fa891fc3c79333a9453c28c2e948a61131bda1a8 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "0ea98503177ca3420daa6c62fa891fc3c79333a9453c28c2e948a61131bda1a8", kill_on_drop: false }` [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/main.rs:181:5 [INFO] [stderr] | [INFO] [stderr] 181 | opener::open(link.as_str()); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_must_use)]` on by default [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] [INFO] [stderr] warning: unused `std::result::Result` that must be used [INFO] [stderr] --> src/persistence.rs:1:804 [INFO] [stderr] | [INFO] [stderr] 1 | use std::fs::{File, OpenOptions};use std::fs;use std::io::BufReader;use std::path::{Path, PathBuf};use serde_json;use crate::search::Search;static FILE_NAME: &str = "ssearch.json";fn get_location() -> Box { Box::new(dirs::home_dir().unwrap().join(".ssearch").join(FILE_NAME))}pub trait Persistence { fn write(t: &[T]) -> PersistenceResult; fn load() -> Vec; fn is_already_exits() -> bool; fn update(t: Search) -> PersistenceResult; fn remove(kw: String) -> PersistenceResult;}pub struct FileBasedSearchPersistence;#[derive(PartialEq)]pub enum PersistenceResult { Created, Updated, Deleted, Error, Nothing,}impl Persistence for FileBasedSearchPersistence { fn write(t: &[Search]) -> PersistenceResult { fs::create_dir(get_location().as_path().parent().unwrap()); let file = OpenOptions::new() .create(true) .read(true) .write(true) .truncate(true) .open(get_location().as_path()); if file.is_err() { return PersistenceResult::Error; } let result = serde_json::to_writer(&file.unwrap(), t); if result.is_ok() { result.unwrap(); return PersistenceResult::Created; } return PersistenceResult::Error; } fn load() -> Vec { let file = File::open(get_location().as_path()).unwrap(); let read = serde_json::from_reader(BufReader::new(file)).unwrap(); return serde_json::from_value(read).unwrap(); } fn is_already_exits() -> bool { return Path::exists(get_location().as_path().parent().unwrap()); } fn update(t: Search) -> PersistenceResult { let mut contents = FileBasedSearchPersistence::load(); let original_size = contents.len(); contents.retain(|x| *x != t); if contents.len() < original_size { return PersistenceResult::Updated; } contents.push(t); FileBasedSearchPersistence::write(&contents); return PersistenceResult::Created; } fn remove(kw: String) -> PersistenceResult { let mut contents = FileBasedSearchPersistence::load(); let original_size = contents.len(); contents.retain(|x| x.keyword != kw); if original_size == contents.len() { return PersistenceResult::Nothing; } FileBasedSearchPersistence::write(&contents); return PersistenceResult::Deleted; }} [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] [INFO] [stderr] warning: 2 warnings emitted [INFO] [stderr] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 0.11s [INFO] [stderr] Running /opt/rustwide/target/debug/deps/ssearch-a648df1396788928 [INFO] [stdout] [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "0ea98503177ca3420daa6c62fa891fc3c79333a9453c28c2e948a61131bda1a8", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "0ea98503177ca3420daa6c62fa891fc3c79333a9453c28c2e948a61131bda1a8", kill_on_drop: false }` [INFO] [stdout] 0ea98503177ca3420daa6c62fa891fc3c79333a9453c28c2e948a61131bda1a8