[INFO] fetching crate secrets 1.1.0... [INFO] documenting secrets-1.1.0 against 1.46.0 for beta-1.47-rustdoc-1 [INFO] extracting crate secrets 1.1.0 into /workspace/builds/worker-6/source [INFO] validating manifest of crates.io crate secrets 1.1.0 on toolchain 1.46.0 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+1.46.0" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking crates.io crate secrets 1.1.0 [INFO] finished tweaking crates.io crate secrets 1.1.0 [INFO] tweaked toml for crates.io crate secrets 1.1.0 written to /workspace/builds/worker-6/source/Cargo.toml [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+1.46.0" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update", kill_on_drop: false }` [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+1.46.0" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:d92eaeed33fa75130ca1ee6c8a01d1ffb62bac859dfdfb3450e3e5d1c0146529" "/opt/rustwide/cargo-home/bin/cargo" "+1.46.0" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] 2e460f03005b6f3f8c8b57ab31ae56e38cd91701b84dc029d79873d3b8c4bce9 [INFO] running `Command { std: "docker" "start" "-a" "2e460f03005b6f3f8c8b57ab31ae56e38cd91701b84dc029d79873d3b8c4bce9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "2e460f03005b6f3f8c8b57ab31ae56e38cd91701b84dc029d79873d3b8c4bce9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "2e460f03005b6f3f8c8b57ab31ae56e38cd91701b84dc029d79873d3b8c4bce9", kill_on_drop: false }` [INFO] [stdout] 2e460f03005b6f3f8c8b57ab31ae56e38cd91701b84dc029d79873d3b8c4bce9 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTDOCFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:d92eaeed33fa75130ca1ee6c8a01d1ffb62bac859dfdfb3450e3e5d1c0146529" "/opt/rustwide/cargo-home/bin/cargo" "+1.46.0" "doc" "--frozen" "--no-deps" "--document-private-items" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 6b3fada93aac07fd712c4ec69ce6edb37ae26b43b6502bd855094ce4d3fad637 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "6b3fada93aac07fd712c4ec69ce6edb37ae26b43b6502bd855094ce4d3fad637", kill_on_drop: false }` [INFO] [stderr] Compiling secrets v1.1.0 (/opt/rustwide/workdir) [INFO] [stderr] Documenting secrets v1.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: documentation test in private item [INFO] [stdout] --> src/secret.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / /// A type for protecting secrets allocated on the stack. [INFO] [stdout] 13 | | /// [INFO] [stdout] 14 | | /// Stack-allocated secrets have distinct security needs from [INFO] [stdout] 15 | | /// heap-allocated secrets, and should be preferred when possible. They [INFO] [stdout] ... | [INFO] [stdout] 79 | | /// [INFO] [stdout] 80 | | /// [mlock]: http://man7.org/linux/man-pages/man2/mlock.2.html [INFO] [stdout] | |______________________________________________________________^ [INFO] [stdout] | [INFO] [stdout] note: the lint level is defined here [INFO] [stdout] --> src/lib.rs:140:9 [INFO] [stdout] | [INFO] [stdout] 140 | #![warn(rustdoc)] [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] = note: `#[warn(private_doc_tests)]` implied by `#[warn(rustdoc)]` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: documentation test in private item [INFO] [stdout] --> src/secret_box.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / /// [INFO] [stdout] 8 | | /// A type for protecting fixed-length secrets allocated on the heap. [INFO] [stdout] 9 | | /// [INFO] [stdout] 10 | | /// Heap-allocated secrets have distinct security needs from [INFO] [stdout] ... | [INFO] [stdout] 128 | | /// [mlock]: http://man7.org/linux/man-pages/man2/mlock.2.html [INFO] [stdout] 129 | | /// [refcell]: std::cell::RefCell [INFO] [stdout] | |_________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: documentation test in private item [INFO] [stdout] --> src/secret_vec.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / /// A type for protecting variable-length secrets allocated on the heap. [INFO] [stdout] 8 | | /// [INFO] [stdout] 9 | | /// Heap-allocated secrets have distinct security needs from [INFO] [stdout] 10 | | /// stack-allocated ones. They provide the following guarantees: [INFO] [stdout] ... | [INFO] [stdout] 127 | | /// [mlock]: http://man7.org/linux/man-pages/man2/mlock.2.html [INFO] [stdout] 128 | | /// [refcell]: std::cell::RefCell [INFO] [stdout] | |_________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: documentation test in private item [INFO] [stdout] --> src/secret.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / /// A type for protecting secrets allocated on the stack. [INFO] [stdout] 13 | | /// [INFO] [stdout] 14 | | /// Stack-allocated secrets have distinct security needs from [INFO] [stdout] 15 | | /// heap-allocated secrets, and should be preferred when possible. They [INFO] [stdout] ... | [INFO] [stdout] 79 | | /// [INFO] [stdout] 80 | | /// [mlock]: http://man7.org/linux/man-pages/man2/mlock.2.html [INFO] [stdout] | |______________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: documentation test in private item [INFO] [stdout] --> src/secret.rs:96:5 [INFO] [stdout] | [INFO] [stdout] 96 | / /// Creates a new [`Secret`] and invokes the provided callback with [INFO] [stdout] 97 | | /// a wrapper to the protected memory. This memory will be filled [INFO] [stdout] 98 | | /// with a well-defined, arbitrary byte pattern, and should be [INFO] [stdout] 99 | | /// initialized to something meaningful before actual use. [INFO] [stdout] ... | [INFO] [stdout] 108 | | /// }); [INFO] [stdout] 109 | | /// ``` [INFO] [stdout] | |___________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: documentation test in private item [INFO] [stdout] --> src/secret.rs:130:5 [INFO] [stdout] | [INFO] [stdout] 130 | / /// Creates a new [`Secret`] filled with zeroed bytes and invokes the [INFO] [stdout] 131 | | /// callback with a wrapper to the protected memory. [INFO] [stdout] 132 | | /// [INFO] [stdout] 133 | | /// ``` [INFO] [stdout] ... | [INFO] [stdout] 137 | | /// }); [INFO] [stdout] 138 | | /// ``` [INFO] [stdout] | |___________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: documentation test in private item [INFO] [stdout] --> src/secret.rs:149:5 [INFO] [stdout] | [INFO] [stdout] 149 | / /// Creates a new [`Secret`] from existing, unprotected data, and [INFO] [stdout] 150 | | /// immediately zeroes out the memory of the data being moved in. [INFO] [stdout] 151 | | /// Invokes the callback with a wrapper to the protected memory. [INFO] [stdout] 152 | | /// [INFO] [stdout] ... | [INFO] [stdout] 161 | | /// assert_eq!(bytes, [0, 0, 0, 0]); [INFO] [stdout] 162 | | /// ``` [INFO] [stdout] | |___________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: documentation test in private item [INFO] [stdout] --> src/secret.rs:175:5 [INFO] [stdout] | [INFO] [stdout] 175 | / /// Creates a new [`Secret`] filled with random bytes and invokes [INFO] [stdout] 176 | | /// the callback with a wrapper to the protected memory. [INFO] [stdout] 177 | | /// [INFO] [stdout] 178 | | /// ``` [INFO] [stdout] ... | [INFO] [stdout] 182 | | /// }) [INFO] [stdout] 183 | | /// ``` [INFO] [stdout] | |___________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: documentation test in private item [INFO] [stdout] --> src/secret_box.rs:161:5 [INFO] [stdout] | [INFO] [stdout] 161 | / /// Instantiates and returns a new [`SecretBox`]. [INFO] [stdout] 162 | | /// [INFO] [stdout] 163 | | /// Accepts a callback function that is responsible for initializing [INFO] [stdout] 164 | | /// its contents. The value yielded to the initialization callback [INFO] [stdout] ... | [INFO] [stdout] 173 | | /// assert_eq!(*secret.borrow(), 0x20); [INFO] [stdout] 174 | | /// ``` [INFO] [stdout] | |___________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: documentation test in private item [INFO] [stdout] --> src/secret_box.rs:204:5 [INFO] [stdout] | [INFO] [stdout] 204 | / /// Immutably borrows the contents of the [`SecretBox`]. Returns a [INFO] [stdout] 205 | | /// wrapper that ensures the underlying memory is [INFO] [stdout] 206 | | /// [`mprotect(2)`][mprotect]ed once all borrows exit scope. [INFO] [stdout] 207 | | /// [INFO] [stdout] ... | [INFO] [stdout] 220 | | /// [INFO] [stdout] 221 | | /// [mprotect]: http://man7.org/linux/man-pages/man2/mprotect.2.html [INFO] [stdout] | |________________________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: documentation test in private item [INFO] [stdout] --> src/secret_box.rs:226:5 [INFO] [stdout] | [INFO] [stdout] 226 | / /// Mutably borrows the contents of the [`SecretBox`]. Returns a [INFO] [stdout] 227 | | /// wrapper that ensures the underlying memory is [INFO] [stdout] 228 | | /// [`mprotect(2)`][mprotect]ed once this borrow exits scope. [INFO] [stdout] 229 | | /// [INFO] [stdout] ... | [INFO] [stdout] 241 | | /// [INFO] [stdout] 242 | | /// [mprotect]: http://man7.org/linux/man-pages/man2/mprotect.2.html [INFO] [stdout] | |________________________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: documentation test in private item [INFO] [stdout] --> src/secret_vec.rs:160:5 [INFO] [stdout] | [INFO] [stdout] 160 | / /// Instantiates and returns a new `SecretVec`. [INFO] [stdout] 161 | | /// [INFO] [stdout] 162 | | /// Accepts a callback function that is responsible for initializing [INFO] [stdout] 163 | | /// its contents. The value yielded to the initialization callback [INFO] [stdout] ... | [INFO] [stdout] 175 | | /// assert_eq!(*secret.borrow(), [0x10, 0x20]); [INFO] [stdout] 176 | | /// ``` [INFO] [stdout] | |___________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: documentation test in private item [INFO] [stdout] --> src/secret_vec.rs:216:5 [INFO] [stdout] | [INFO] [stdout] 216 | / /// Immutably borrows the contents of the [`SecretVec`]. Returns a [INFO] [stdout] 217 | | /// wrapper that ensures the underlying memory is [INFO] [stdout] 218 | | /// [`mprotect(2)`][mprotect]ed once all borrows exit scope. [INFO] [stdout] 219 | | /// [INFO] [stdout] ... | [INFO] [stdout] 232 | | /// [INFO] [stdout] 233 | | /// [mprotect]: http://man7.org/linux/man-pages/man2/mprotect.2.html [INFO] [stdout] | |________________________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: documentation test in private item [INFO] [stdout] --> src/secret_vec.rs:238:5 [INFO] [stdout] | [INFO] [stdout] 238 | / /// Mutably borrows the contents of the [`SecretVec`]. Returns a [INFO] [stdout] 239 | | /// wrapper that ensures the underlying memory is [INFO] [stdout] 240 | | /// [`mprotect(2)`][mprotect]ed once this borrow exits scope. [INFO] [stdout] 241 | | /// [INFO] [stdout] ... | [INFO] [stdout] 253 | | /// [INFO] [stdout] 254 | | /// [mprotect]: http://man7.org/linux/man-pages/man2/mprotect.2.html [INFO] [stdout] | |________________________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 14 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 3.09s [INFO] running `Command { std: "docker" "inspect" "6b3fada93aac07fd712c4ec69ce6edb37ae26b43b6502bd855094ce4d3fad637", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "6b3fada93aac07fd712c4ec69ce6edb37ae26b43b6502bd855094ce4d3fad637", kill_on_drop: false }` [INFO] [stdout] 6b3fada93aac07fd712c4ec69ce6edb37ae26b43b6502bd855094ce4d3fad637