[INFO] cloning repository https://github.com/hawnzug/mal [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/hawnzug/mal" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fhawnzug%2Fmal", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fhawnzug%2Fmal'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] 101d4a64034ae1b6df92d487f20410fdfe5520dc [INFO] documenting hawnzug/mal against beta-2022-05-20 for beta-1.62-rustdoc-1 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fhawnzug%2Fmal" "/workspace/builds/worker-14/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-14/source'... [INFO] [stderr] done. [INFO] validating manifest of git repo https://github.com/hawnzug/mal on toolchain beta-2022-05-20 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+beta-2022-05-20" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking git repo https://github.com/hawnzug/mal [INFO] finished tweaking git repo https://github.com/hawnzug/mal [INFO] tweaked toml for git repo https://github.com/hawnzug/mal written to /workspace/builds/worker-14/source/Cargo.toml [INFO] crate git repo https://github.com/hawnzug/mal already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+beta-2022-05-20" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-14/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-14/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d190cb871061d98bc6d0581d85cb2ecb09a0f8a142ba5463de30be9999fc3251" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2022-05-20" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 4fc8e2060c5856b9b7aceab795fb24c135dba4d6caf29d7b520bc96de48dbd7f [INFO] running `Command { std: "docker" "start" "-a" "4fc8e2060c5856b9b7aceab795fb24c135dba4d6caf29d7b520bc96de48dbd7f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "4fc8e2060c5856b9b7aceab795fb24c135dba4d6caf29d7b520bc96de48dbd7f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "4fc8e2060c5856b9b7aceab795fb24c135dba4d6caf29d7b520bc96de48dbd7f", kill_on_drop: false }` [INFO] [stdout] 4fc8e2060c5856b9b7aceab795fb24c135dba4d6caf29d7b520bc96de48dbd7f [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-14/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-14/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTDOCFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d190cb871061d98bc6d0581d85cb2ecb09a0f8a142ba5463de30be9999fc3251" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2022-05-20" "doc" "--frozen" "--no-deps" "--document-private-items" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 33b2679536c6c6a201d6f8e93472f1ea81ebc17cab82319babda0fcde4e6deb8 [INFO] running `Command { std: "docker" "start" "-a" "33b2679536c6c6a201d6f8e93472f1ea81ebc17cab82319babda0fcde4e6deb8", kill_on_drop: false }` [INFO] [stderr] Checking custom_derive v0.1.4 [INFO] [stderr] Checking bitflags v0.5.0 [INFO] [stderr] Checking conv v0.3.2 [INFO] [stderr] Checking chomp v0.2.5 [INFO] [stderr] Documenting practice_mal v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: `...` range patterns are deprecated [INFO] [stdout] --> src/reader.rs:110:11 [INFO] [stdout] | [INFO] [stdout] 110 | 35...38 => true, [INFO] [stdout] | ^^^ help: use `..=` for an inclusive range [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(ellipsis_inclusive_range_patterns)]` on by default [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2015) but is a hard error in Rust 2021! [INFO] [stdout] = note: for more information, see [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `...` range patterns are deprecated [INFO] [stdout] --> src/reader.rs:112:11 [INFO] [stdout] | [INFO] [stdout] 112 | 60...64 => true, [INFO] [stdout] | ^^^ help: use `..=` for an inclusive range [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2015) but is a hard error in Rust 2021! [INFO] [stdout] = note: for more information, see [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `...` range patterns are deprecated [INFO] [stdout] --> src/reader.rs:113:11 [INFO] [stdout] | [INFO] [stdout] 113 | 94...95 => true, [INFO] [stdout] | ^^^ help: use `..=` for an inclusive range [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2015) but is a hard error in Rust 2021! [INFO] [stdout] = note: for more information, see [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 3 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 1.92s [INFO] running `Command { std: "docker" "inspect" "33b2679536c6c6a201d6f8e93472f1ea81ebc17cab82319babda0fcde4e6deb8", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "33b2679536c6c6a201d6f8e93472f1ea81ebc17cab82319babda0fcde4e6deb8", kill_on_drop: false }` [INFO] [stdout] 33b2679536c6c6a201d6f8e93472f1ea81ebc17cab82319babda0fcde4e6deb8