[INFO] updating cached repository https://github.com/Kollode/rustpass [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "-c" "remote.origin.fetch=refs/heads/*:refs/heads/*" "fetch" "origin" "--force" "--prune", kill_on_drop: false }` [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] 6192ce4e8003c8c86329c5963be3940577b97578 [INFO] testing Kollode/rustpass against beta-2020-07-24 for beta-1.46-1 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FKollode%2Frustpass" "/workspace/builds/worker-14/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-14/source'... [INFO] [stderr] done. [INFO] validating manifest of git repo https://github.com/Kollode/rustpass on toolchain beta-2020-07-24 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+beta-2020-07-24" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking git repo https://github.com/Kollode/rustpass [INFO] finished tweaking git repo https://github.com/Kollode/rustpass [INFO] tweaked toml for git repo https://github.com/Kollode/rustpass written to /workspace/builds/worker-14/source/Cargo.toml [INFO] crate git repo https://github.com/Kollode/rustpass already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+beta-2020-07-24" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-14/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-14/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2020-07-24" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] 95eeb9b6ea8e004a5ca38c1af9a2694ead64e32f603021e424ccdc1a5920b242 [INFO] running `Command { std: "docker" "start" "-a" "95eeb9b6ea8e004a5ca38c1af9a2694ead64e32f603021e424ccdc1a5920b242", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "95eeb9b6ea8e004a5ca38c1af9a2694ead64e32f603021e424ccdc1a5920b242", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "95eeb9b6ea8e004a5ca38c1af9a2694ead64e32f603021e424ccdc1a5920b242", kill_on_drop: false }` [INFO] [stdout] 95eeb9b6ea8e004a5ca38c1af9a2694ead64e32f603021e424ccdc1a5920b242 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-14/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-14/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2020-07-24" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 5269fff21a41eb24aba27ce0f1ca0768ed09b380b1c97c21f4f4a969efdd5669 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "5269fff21a41eb24aba27ce0f1ca0768ed09b380b1c97c21f4f4a969efdd5669", kill_on_drop: false }` [INFO] [stderr] Compiling gcc v0.3.54 [INFO] [stderr] Compiling rprompt v1.0.3 [INFO] [stderr] Compiling rand v0.3.20 [INFO] [stderr] Compiling clap v2.29.2 [INFO] [stderr] Compiling rpassword v1.0.2 [INFO] [stderr] Compiling rust-crypto v0.2.36 [INFO] [stderr] Compiling rustpass v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused import: `crypto::aes::ecb_encryptor` [INFO] [stdout] --> src/kdbx/mod.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | use crypto::aes::ecb_encryptor; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `crypto::aes::KeySize` [INFO] [stdout] --> src/kdbx/mod.rs:8:5 [INFO] [stdout] | [INFO] [stdout] 8 | use crypto::aes::KeySize; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `crypto::blockmodes::NoPadding` [INFO] [stdout] --> src/kdbx/mod.rs:9:5 [INFO] [stdout] | [INFO] [stdout] 9 | use crypto::blockmodes::NoPadding; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `RefReadBuffer`, `RefWriteBuffer` [INFO] [stdout] --> src/kdbx/mod.rs:10:22 [INFO] [stdout] | [INFO] [stdout] 10 | use crypto::buffer::{RefReadBuffer, RefWriteBuffer}; [INFO] [stdout] | ^^^^^^^^^^^^^ ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `transformed_key` [INFO] [stdout] --> src/kdbx/mod.rs:200:13 [INFO] [stdout] | [INFO] [stdout] 200 | let transformed_key = header.transformed_key(composite_key); [INFO] [stdout] | ^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_transformed_key` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `encrypted_payload` [INFO] [stdout] --> src/kdbx/mod.rs:191:20 [INFO] [stdout] | [INFO] [stdout] 191 | fn get_payload(encrypted_payload: &[u8], header: &Header, password: &str) -> Result, DatabaseError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_encrypted_payload` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/kdbx/mod.rs:90:13 [INFO] [stdout] | [INFO] [stdout] 90 | let mut transformed_key = composite_key; [INFO] [stdout] | ----^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 7 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 21.55s [INFO] running `Command { std: "docker" "inspect" "5269fff21a41eb24aba27ce0f1ca0768ed09b380b1c97c21f4f4a969efdd5669", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "5269fff21a41eb24aba27ce0f1ca0768ed09b380b1c97c21f4f4a969efdd5669", kill_on_drop: false }` [INFO] [stdout] 5269fff21a41eb24aba27ce0f1ca0768ed09b380b1c97c21f4f4a969efdd5669 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-14/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-14/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2020-07-24" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] c0f535e11fc2eeaa0e7f9bd9c5a4aef8b687b091702b9002122bde50e9426080 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "c0f535e11fc2eeaa0e7f9bd9c5a4aef8b687b091702b9002122bde50e9426080", kill_on_drop: false }` [INFO] [stderr] Compiling rustpass v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused import: `crypto::aes::ecb_encryptor` [INFO] [stdout] --> src/kdbx/mod.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | use crypto::aes::ecb_encryptor; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `crypto::aes::KeySize` [INFO] [stdout] --> src/kdbx/mod.rs:8:5 [INFO] [stdout] | [INFO] [stdout] 8 | use crypto::aes::KeySize; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `crypto::blockmodes::NoPadding` [INFO] [stdout] --> src/kdbx/mod.rs:9:5 [INFO] [stdout] | [INFO] [stdout] 9 | use crypto::blockmodes::NoPadding; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `RefReadBuffer`, `RefWriteBuffer` [INFO] [stdout] --> src/kdbx/mod.rs:10:22 [INFO] [stdout] | [INFO] [stdout] 10 | use crypto::buffer::{RefReadBuffer, RefWriteBuffer}; [INFO] [stdout] | ^^^^^^^^^^^^^ ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `transformed_key` [INFO] [stdout] --> src/kdbx/mod.rs:200:13 [INFO] [stdout] | [INFO] [stdout] 200 | let transformed_key = header.transformed_key(composite_key); [INFO] [stdout] | ^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_transformed_key` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `encrypted_payload` [INFO] [stdout] --> src/kdbx/mod.rs:191:20 [INFO] [stdout] | [INFO] [stdout] 191 | fn get_payload(encrypted_payload: &[u8], header: &Header, password: &str) -> Result, DatabaseError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_encrypted_payload` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/kdbx/mod.rs:90:13 [INFO] [stdout] | [INFO] [stdout] 90 | let mut transformed_key = composite_key; [INFO] [stdout] | ----^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 7 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 0.89s [INFO] running `Command { std: "docker" "inspect" "c0f535e11fc2eeaa0e7f9bd9c5a4aef8b687b091702b9002122bde50e9426080", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "c0f535e11fc2eeaa0e7f9bd9c5a4aef8b687b091702b9002122bde50e9426080", kill_on_drop: false }` [INFO] [stdout] c0f535e11fc2eeaa0e7f9bd9c5a4aef8b687b091702b9002122bde50e9426080 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-14/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-14/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2020-07-24" "test" "--frozen", kill_on_drop: false }` [INFO] [stdout] 45e54897bc626ca04162721bad92941371bc60a4e7cf82884aa99d1dee563d8f [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "45e54897bc626ca04162721bad92941371bc60a4e7cf82884aa99d1dee563d8f", kill_on_drop: false }` [INFO] [stderr] warning: unused import: `crypto::aes::ecb_encryptor` [INFO] [stderr] --> src/kdbx/mod.rs:7:5 [INFO] [stderr] | [INFO] [stderr] 7 | use crypto::aes::ecb_encryptor; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_imports)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unused import: `crypto::aes::KeySize` [INFO] [stderr] --> src/kdbx/mod.rs:8:5 [INFO] [stderr] | [INFO] [stderr] 8 | use crypto::aes::KeySize; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `crypto::blockmodes::NoPadding` [INFO] [stderr] --> src/kdbx/mod.rs:9:5 [INFO] [stderr] | [INFO] [stderr] 9 | use crypto::blockmodes::NoPadding; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused imports: `RefReadBuffer`, `RefWriteBuffer` [INFO] [stderr] --> src/kdbx/mod.rs:10:22 [INFO] [stderr] | [INFO] [stderr] 10 | use crypto::buffer::{RefReadBuffer, RefWriteBuffer}; [INFO] [stderr] | ^^^^^^^^^^^^^ ^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused variable: `transformed_key` [INFO] [stderr] --> src/kdbx/mod.rs:200:13 [INFO] [stderr] | [INFO] [stderr] 200 | let transformed_key = header.transformed_key(composite_key); [INFO] [stderr] | ^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_transformed_key` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unused variable: `encrypted_payload` [INFO] [stderr] --> src/kdbx/mod.rs:191:20 [INFO] [stderr] | [INFO] [stderr] 191 | fn get_payload(encrypted_payload: &[u8], header: &Header, password: &str) -> Result, DatabaseError> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_encrypted_payload` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> src/kdbx/mod.rs:90:13 [INFO] [stderr] | [INFO] [stderr] 90 | let mut transformed_key = composite_key; [INFO] [stderr] | ----^^^^^^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_mut)]` on by default [INFO] [stderr] [INFO] [stderr] warning: 7 warnings emitted [INFO] [stderr] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 0.06s [INFO] [stdout] [INFO] [stderr] Running /opt/rustwide/target/debug/deps/rustpass-44595fbb2c93d11a [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "45e54897bc626ca04162721bad92941371bc60a4e7cf82884aa99d1dee563d8f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "45e54897bc626ca04162721bad92941371bc60a4e7cf82884aa99d1dee563d8f", kill_on_drop: false }` [INFO] [stdout] 45e54897bc626ca04162721bad92941371bc60a4e7cf82884aa99d1dee563d8f