[INFO] cloning repository https://github.com/IvySeo/encrypt_file [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/IvySeo/encrypt_file" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FIvySeo%2Fencrypt_file", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FIvySeo%2Fencrypt_file'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] d9bb51d13de55cf7513760d88ae0cf103c60a6b1 [INFO] testing IvySeo/encrypt_file against 1.59.0 for beta-1.60-1 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FIvySeo%2Fencrypt_file" "/workspace/builds/worker-21/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-21/source'... [INFO] [stderr] done. [INFO] [stderr] Updating files: 35% (526/1468) Updating files: 36% (529/1468) Updating files: 37% (544/1468) Updating files: 38% (558/1468) Updating files: 39% (573/1468) Updating files: 40% (588/1468) Updating files: 41% (602/1468) Updating files: 42% (617/1468) Updating files: 43% (632/1468) Updating files: 44% (646/1468) Updating files: 45% (661/1468) Updating files: 46% (676/1468) Updating files: 47% (690/1468) Updating files: 48% (705/1468) Updating files: 49% (720/1468) Updating files: 50% (734/1468) Updating files: 51% (749/1468) Updating files: 52% (764/1468) Updating files: 53% (779/1468) Updating files: 54% (793/1468) Updating files: 55% (808/1468) Updating files: 56% (823/1468) Updating files: 57% (837/1468) Updating files: 58% (852/1468) Updating files: 59% (867/1468) Updating files: 60% (881/1468) Updating files: 61% (896/1468) Updating files: 62% (911/1468) Updating files: 63% (925/1468) Updating files: 64% (940/1468) Updating files: 65% (955/1468) Updating files: 66% (969/1468) Updating files: 67% (984/1468) Updating files: 68% (999/1468) Updating files: 69% (1013/1468) Updating files: 70% (1028/1468) Updating files: 71% (1043/1468) Updating files: 72% (1057/1468) Updating files: 73% (1072/1468) Updating files: 74% (1087/1468) Updating files: 75% (1101/1468) Updating files: 76% (1116/1468) Updating files: 77% (1131/1468) Updating files: 78% (1146/1468) Updating files: 79% (1160/1468) Updating files: 80% (1175/1468) Updating files: 81% (1190/1468) Updating files: 82% (1204/1468) Updating files: 83% (1219/1468) Updating files: 84% (1234/1468) Updating files: 85% (1248/1468) Updating files: 86% (1263/1468) Updating files: 87% (1278/1468) Updating files: 88% (1292/1468) Updating files: 88% (1304/1468) Updating files: 89% (1307/1468) Updating files: 90% (1322/1468) Updating files: 91% (1336/1468) Updating files: 92% (1351/1468) Updating files: 93% (1366/1468) Updating files: 94% (1380/1468) Updating files: 95% (1395/1468) Updating files: 96% (1410/1468) Updating files: 97% (1424/1468) Updating files: 98% (1439/1468) Updating files: 98% (1442/1468) Updating files: 99% (1454/1468) Updating files: 100% (1468/1468) Updating files: 100% (1468/1468), done. [INFO] validating manifest of git repo https://github.com/IvySeo/encrypt_file on toolchain 1.59.0 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+1.59.0" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking git repo https://github.com/IvySeo/encrypt_file [INFO] finished tweaking git repo https://github.com/IvySeo/encrypt_file [INFO] tweaked toml for git repo https://github.com/IvySeo/encrypt_file written to /workspace/builds/worker-21/source/Cargo.toml [INFO] crate git repo https://github.com/IvySeo/encrypt_file already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+1.59.0" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-21/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-21/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:0cd99ca24d8e8c98e67c542213511d985b8778b5bdcbb160e038429496686047" "/opt/rustwide/cargo-home/bin/cargo" "+1.59.0" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 62c0d15981484a7074a1dbcb5aa67c227186da7335daf7ca0f979ead7f55f03c [INFO] running `Command { std: "docker" "start" "-a" "62c0d15981484a7074a1dbcb5aa67c227186da7335daf7ca0f979ead7f55f03c", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "62c0d15981484a7074a1dbcb5aa67c227186da7335daf7ca0f979ead7f55f03c", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "62c0d15981484a7074a1dbcb5aa67c227186da7335daf7ca0f979ead7f55f03c", kill_on_drop: false }` [INFO] [stdout] 62c0d15981484a7074a1dbcb5aa67c227186da7335daf7ca0f979ead7f55f03c [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-21/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-21/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:0cd99ca24d8e8c98e67c542213511d985b8778b5bdcbb160e038429496686047" "/opt/rustwide/cargo-home/bin/cargo" "+1.59.0" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 7ce4a0b834a04c23a428bfa6eaf26ca7004a83fc34feabf253b2c0b84e6691d1 [INFO] running `Command { std: "docker" "start" "-a" "7ce4a0b834a04c23a428bfa6eaf26ca7004a83fc34feabf253b2c0b84e6691d1", kill_on_drop: false }` [INFO] [stderr] Compiling libc v0.2.71 [INFO] [stderr] Compiling cc v1.0.54 [INFO] [stderr] Compiling pkg-config v0.3.17 [INFO] [stderr] Compiling autocfg v1.0.0 [INFO] [stderr] Compiling proc-macro2 v1.0.18 [INFO] [stderr] Compiling typenum v1.12.0 [INFO] [stderr] Compiling syn v1.0.31 [INFO] [stderr] Compiling serde v1.0.111 [INFO] [stderr] Compiling getrandom v0.1.14 [INFO] [stderr] Compiling gimli v0.21.0 [INFO] [stderr] Compiling smallvec v1.4.0 [INFO] [stderr] Compiling ppv-lite86 v0.2.8 [INFO] [stderr] Compiling byte-tools v0.2.0 [INFO] [stderr] Compiling bitflags v0.7.0 [INFO] [stderr] Compiling curl v0.4.29 [INFO] [stderr] Compiling object v0.19.0 [INFO] [stderr] Compiling constant_time_eq v0.1.5 [INFO] [stderr] Compiling anyhow v1.0.31 [INFO] [stderr] Compiling openssl-probe v0.1.2 [INFO] [stderr] Compiling hex v0.2.0 [INFO] [stderr] Compiling base64 v0.12.1 [INFO] [stderr] Compiling log v0.3.9 [INFO] [stderr] Compiling xml-rs v0.3.6 [INFO] [stderr] Compiling unicode-normalization v0.1.12 [INFO] [stderr] Compiling num-traits v0.2.11 [INFO] [stderr] Compiling num-integer v0.1.42 [INFO] [stderr] Compiling quote v1.0.7 [INFO] [stderr] Compiling openssl-sys v0.9.58 [INFO] [stderr] Compiling libz-sys v1.0.25 [INFO] [stderr] Compiling curl-sys v0.4.31+curl-7.70.0 [INFO] [stderr] Compiling idna v0.1.5 [INFO] [stderr] Compiling xattr v0.2.2 [INFO] [stderr] Compiling filetime v0.2.10 [INFO] [stderr] Compiling time v0.1.43 [INFO] [stderr] Compiling socket2 v0.3.12 [INFO] [stderr] Compiling tar v0.4.28 [INFO] [stderr] Compiling rand_core v0.5.1 [INFO] [stderr] Compiling url v1.7.2 [INFO] [stderr] Compiling generic-array v0.8.3 [INFO] [stderr] Compiling rand_chacha v0.2.2 [INFO] [stderr] Compiling digest v0.6.2 [INFO] [stderr] Compiling block-buffer v0.2.0 [INFO] [stderr] Compiling crypto-mac v0.4.0 [INFO] [stderr] Compiling hmac v0.4.2 [INFO] [stderr] Compiling sha2 v0.6.0 [INFO] [stderr] Compiling rand v0.7.3 [INFO] [stderr] Compiling addr2line v0.12.1 [INFO] [stderr] Compiling chrono v0.4.11 [INFO] [stderr] Compiling backtrace v0.3.48 [INFO] [stderr] Compiling libsodium-sys v0.2.5 [INFO] [stderr] Compiling error-chain v0.10.0 [INFO] [stderr] Compiling serde_derive v1.0.111 [INFO] [stderr] Compiling serde-xml-rs v0.2.1 [INFO] [stderr] Compiling uuid v0.8.1 [INFO] [stderr] Compiling rust-s3 v0.8.2 [INFO] [stderr] Compiling sodiumoxide v0.2.5 [INFO] [stderr] Compiling encrypt_file v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: variable `encrypted` is assigned to, but never used [INFO] [stdout] --> src/encrypt.rs:30:21 [INFO] [stdout] | [INFO] [stdout] 30 | let mut encrypted = "temp encrypted".to_string(); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] = note: consider using `_encrypted` instead [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `index` [INFO] [stdout] --> src/encrypt.rs:34:18 [INFO] [stdout] | [INFO] [stdout] 34 | for (index, line) in reader.lines().enumerate() { [INFO] [stdout] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_index` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `encrypted` is never read [INFO] [stdout] --> src/encrypt.rs:50:17 [INFO] [stdout] | [INFO] [stdout] 50 | encrypted = format!("{:?}", encrypted_result); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_assignments)]` on by default [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `FILE_NAME_UUID` should have a snake case name [INFO] [stdout] --> src/encrypt.rs:31:21 [INFO] [stdout] | [INFO] [stdout] 31 | let mut FILE_NAME_UUID: String = "filename_uuid".to_string(); [INFO] [stdout] | ^^^^^^^^^^^^^^ help: convert the identifier to snake case: `file_name_uuid` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_snake_case)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `UUID_` should have a snake case name [INFO] [stdout] --> src/encrypt.rs:52:21 [INFO] [stdout] | [INFO] [stdout] 52 | let UUID_ = write_file::write_file(encrypted_result); [INFO] [stdout] | ^^^^^ help: convert the identifier to snake case: `uuid` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `UUID` should have a snake case name [INFO] [stdout] --> src/encrypt.rs:54:24 [INFO] [stdout] | [INFO] [stdout] 54 | Ok(UUID) => { [INFO] [stdout] | ^^^^ help: convert the identifier to snake case: `uuid` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 6 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 55.25s [INFO] running `Command { std: "docker" "inspect" "7ce4a0b834a04c23a428bfa6eaf26ca7004a83fc34feabf253b2c0b84e6691d1", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "7ce4a0b834a04c23a428bfa6eaf26ca7004a83fc34feabf253b2c0b84e6691d1", kill_on_drop: false }` [INFO] [stdout] 7ce4a0b834a04c23a428bfa6eaf26ca7004a83fc34feabf253b2c0b84e6691d1 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-21/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-21/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:0cd99ca24d8e8c98e67c542213511d985b8778b5bdcbb160e038429496686047" "/opt/rustwide/cargo-home/bin/cargo" "+1.59.0" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 072b71a4b0d4ff8fbe2c3a80b763c60ed4da9200aab92be492f224ba518b7ca4 [INFO] running `Command { std: "docker" "start" "-a" "072b71a4b0d4ff8fbe2c3a80b763c60ed4da9200aab92be492f224ba518b7ca4", kill_on_drop: false }` [INFO] [stderr] Compiling encrypt_file v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: variable `encrypted` is assigned to, but never used [INFO] [stdout] --> src/encrypt.rs:30:21 [INFO] [stdout] | [INFO] [stdout] 30 | let mut encrypted = "temp encrypted".to_string(); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] = note: consider using `_encrypted` instead [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `index` [INFO] [stdout] --> src/encrypt.rs:34:18 [INFO] [stdout] | [INFO] [stdout] 34 | for (index, line) in reader.lines().enumerate() { [INFO] [stdout] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_index` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `encrypted` is never read [INFO] [stdout] --> src/encrypt.rs:50:17 [INFO] [stdout] | [INFO] [stdout] 50 | encrypted = format!("{:?}", encrypted_result); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_assignments)]` on by default [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `FILE_NAME_UUID` should have a snake case name [INFO] [stdout] --> src/encrypt.rs:31:21 [INFO] [stdout] | [INFO] [stdout] 31 | let mut FILE_NAME_UUID: String = "filename_uuid".to_string(); [INFO] [stdout] | ^^^^^^^^^^^^^^ help: convert the identifier to snake case: `file_name_uuid` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(non_snake_case)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `UUID_` should have a snake case name [INFO] [stdout] --> src/encrypt.rs:52:21 [INFO] [stdout] | [INFO] [stdout] 52 | let UUID_ = write_file::write_file(encrypted_result); [INFO] [stdout] | ^^^^^ help: convert the identifier to snake case: `uuid` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable `UUID` should have a snake case name [INFO] [stdout] --> src/encrypt.rs:54:24 [INFO] [stdout] | [INFO] [stdout] 54 | Ok(UUID) => { [INFO] [stdout] | ^^^^ help: convert the identifier to snake case: `uuid` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 6 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 0.68s [INFO] running `Command { std: "docker" "inspect" "072b71a4b0d4ff8fbe2c3a80b763c60ed4da9200aab92be492f224ba518b7ca4", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "072b71a4b0d4ff8fbe2c3a80b763c60ed4da9200aab92be492f224ba518b7ca4", kill_on_drop: false }` [INFO] [stdout] 072b71a4b0d4ff8fbe2c3a80b763c60ed4da9200aab92be492f224ba518b7ca4 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-21/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-21/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:0cd99ca24d8e8c98e67c542213511d985b8778b5bdcbb160e038429496686047" "/opt/rustwide/cargo-home/bin/cargo" "+1.59.0" "test" "--frozen", kill_on_drop: false }` [INFO] [stdout] 14b813737c3964a6bb6a7f78367ceac79e6aab881253db5337b38424080490a1 [INFO] running `Command { std: "docker" "start" "-a" "14b813737c3964a6bb6a7f78367ceac79e6aab881253db5337b38424080490a1", kill_on_drop: false }` [INFO] [stderr] warning: variable `encrypted` is assigned to, but never used [INFO] [stderr] --> src/encrypt.rs:30:21 [INFO] [stderr] | [INFO] [stderr] 30 | let mut encrypted = "temp encrypted".to_string(); [INFO] [stderr] | ^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` on by default [INFO] [stderr] = note: consider using `_encrypted` instead [INFO] [stderr] [INFO] [stderr] warning: unused variable: `index` [INFO] [stderr] --> src/encrypt.rs:34:18 [INFO] [stderr] | [INFO] [stderr] 34 | for (index, line) in reader.lines().enumerate() { [INFO] [stderr] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_index` [INFO] [stderr] [INFO] [stderr] warning: value assigned to `encrypted` is never read [INFO] [stderr] --> src/encrypt.rs:50:17 [INFO] [stderr] | [INFO] [stderr] 50 | encrypted = format!("{:?}", encrypted_result); [INFO] [stderr] | ^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_assignments)]` on by default [INFO] [stderr] = help: maybe it is overwritten before being read? [INFO] [stderr] [INFO] [stderr] warning: variable `FILE_NAME_UUID` should have a snake case name [INFO] [stderr] --> src/encrypt.rs:31:21 [INFO] [stderr] | [INFO] [stderr] 31 | let mut FILE_NAME_UUID: String = "filename_uuid".to_string(); [INFO] [stderr] | ^^^^^^^^^^^^^^ help: convert the identifier to snake case: `file_name_uuid` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(non_snake_case)]` on by default [INFO] [stderr] [INFO] [stderr] warning: variable `UUID_` should have a snake case name [INFO] [stderr] --> src/encrypt.rs:52:21 [INFO] [stderr] | [INFO] [stderr] 52 | let UUID_ = write_file::write_file(encrypted_result); [INFO] [stderr] | ^^^^^ help: convert the identifier to snake case: `uuid` [INFO] [stderr] [INFO] [stderr] warning: variable `UUID` should have a snake case name [INFO] [stderr] --> src/encrypt.rs:54:24 [INFO] [stderr] | [INFO] [stderr] 54 | Ok(UUID) => { [INFO] [stderr] | ^^^^ help: convert the identifier to snake case: `uuid` [INFO] [stderr] [INFO] [stderr] warning: `encrypt_file` (bin "encrypt_file" test) generated 6 warnings [INFO] [stderr] Finished test [unoptimized + debuginfo] target(s) in 0.04s [INFO] [stderr] Running unittests (/opt/rustwide/target/debug/deps/encrypt_file-f80c042e6cf69ee2) [INFO] [stdout] [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "14b813737c3964a6bb6a7f78367ceac79e6aab881253db5337b38424080490a1", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "14b813737c3964a6bb6a7f78367ceac79e6aab881253db5337b38424080490a1", kill_on_drop: false }` [INFO] [stdout] 14b813737c3964a6bb6a7f78367ceac79e6aab881253db5337b38424080490a1