[INFO] cloning repository https://github.com/kei-gnu/kustomize-envcheck [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/kei-gnu/kustomize-envcheck" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fkei-gnu%2Fkustomize-envcheck", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fkei-gnu%2Fkustomize-envcheck'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] 31babd3dce2f38aed26d8fb65f793b889437b309 [INFO] testing kei-gnu/kustomize-envcheck against try#8de4c7234dd9b97c9d76b58671343fdbbc9a433e+target=x86_64-unknown-linux-musl for musl_upgrade_1_2_5_with_getrandom_patch_0 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fkei-gnu%2Fkustomize-envcheck" "/workspace/builds/worker-2-tc1/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-2-tc1/source'... [INFO] [stderr] done. [INFO] started tweaking git repo https://github.com/kei-gnu/kustomize-envcheck [INFO] finished tweaking git repo https://github.com/kei-gnu/kustomize-envcheck [INFO] tweaked toml for git repo https://github.com/kei-gnu/kustomize-envcheck written to /workspace/builds/worker-2-tc1/source/Cargo.toml [INFO] validating manifest of git repo https://github.com/kei-gnu/kustomize-envcheck on toolchain 8de4c7234dd9b97c9d76b58671343fdbbc9a433e [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+8de4c7234dd9b97c9d76b58671343fdbbc9a433e" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate git repo https://github.com/kei-gnu/kustomize-envcheck already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+8de4c7234dd9b97c9d76b58671343fdbbc9a433e" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded k8s-openapi v0.23.0 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+8de4c7234dd9b97c9d76b58671343fdbbc9a433e" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 1b6d14a507d8ddaac5dfc01f7c6454d9c5ace186c5f6c512e18941e2677e0232 [INFO] running `Command { std: "docker" "start" "-a" "1b6d14a507d8ddaac5dfc01f7c6454d9c5ace186c5f6c512e18941e2677e0232", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "1b6d14a507d8ddaac5dfc01f7c6454d9c5ace186c5f6c512e18941e2677e0232", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "1b6d14a507d8ddaac5dfc01f7c6454d9c5ace186c5f6c512e18941e2677e0232", kill_on_drop: false }` [INFO] [stdout] 1b6d14a507d8ddaac5dfc01f7c6454d9c5ace186c5f6c512e18941e2677e0232 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+8de4c7234dd9b97c9d76b58671343fdbbc9a433e" "build" "--frozen" "--message-format=json" "--target" "x86_64-unknown-linux-musl", kill_on_drop: false }` [INFO] [stdout] e10665c019c533d70d4f1e3575cb1a4bcda923b74c9fe65a3860fe4006f5f26c [INFO] running `Command { std: "docker" "start" "-a" "e10665c019c533d70d4f1e3575cb1a4bcda923b74c9fe65a3860fe4006f5f26c", kill_on_drop: false }` [INFO] [stderr] Compiling unicode-ident v1.0.18 [INFO] [stderr] Compiling autocfg v1.5.0 [INFO] [stderr] Compiling memchr v2.7.5 [INFO] [stderr] Compiling parking_lot_core v0.9.11 [INFO] [stderr] Compiling utf8parse v0.2.2 [INFO] [stderr] Compiling itoa v1.0.15 [INFO] [stderr] Compiling is_terminal_polyfill v1.70.1 [INFO] [stderr] Compiling smallvec v1.15.1 [INFO] [stderr] Compiling proc-macro2 v1.0.95 [INFO] [stderr] Compiling colorchoice v1.0.4 [INFO] [stderr] Compiling anstyle-parse v0.2.7 [INFO] [stderr] Compiling anstyle-query v1.1.3 [INFO] [stderr] Compiling anstyle v1.0.11 [INFO] [stderr] Compiling cfg-if v1.0.1 [INFO] [stderr] Compiling ryu v1.0.20 [INFO] [stderr] Compiling serde_json v1.0.140 [INFO] [stderr] Compiling scopeguard v1.2.0 [INFO] [stderr] Compiling anyhow v1.0.98 [INFO] [stderr] Compiling anstream v0.6.19 [INFO] [stderr] Compiling hashbrown v0.15.4 [INFO] [stderr] Compiling equivalent v1.0.2 [INFO] [stderr] Compiling heck v0.5.0 [INFO] [stderr] Compiling aho-corasick v1.1.3 [INFO] [stderr] Compiling k8s-openapi v0.23.0 [INFO] [stderr] Compiling quote v1.0.40 [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Compiling lock_api v0.4.13 [INFO] [stderr] Compiling strsim v0.11.1 [INFO] [stderr] Compiling syn v2.0.103 [INFO] [stderr] Compiling clap_lex v0.7.5 [INFO] [stderr] Compiling indexmap v2.9.0 [INFO] [stderr] Compiling parking_lot v0.12.4 [INFO] [stderr] Compiling signal-hook-registry v1.4.5 [INFO] [stderr] Compiling clap_builder v4.5.40 [INFO] [stderr] Compiling bytes v1.10.1 [INFO] [stderr] Compiling ordered-float v2.10.1 [INFO] [stderr] Compiling lazy_static v1.5.0 [INFO] [stderr] Compiling unsafe-libyaml v0.2.11 [INFO] [stderr] Compiling base64 v0.22.1 [INFO] [stderr] Compiling colored v2.2.0 [INFO] [stderr] Compiling regex-automata v0.4.9 [INFO] [stderr] Compiling regex v1.11.1 [INFO] [stderr] Compiling serde_derive v1.0.219 [INFO] [stderr] Compiling clap_derive v4.5.40 [INFO] [stderr] Compiling tokio-macros v2.5.0 [INFO] [stderr] Compiling tokio v1.45.1 [INFO] [stderr] Compiling clap v4.5.40 [INFO] [stderr] Compiling serde v1.0.219 [INFO] [stderr] Compiling serde-value v0.7.0 [INFO] [stderr] Compiling chrono v0.4.41 [INFO] [stderr] Compiling serde_yaml v0.9.34+deprecated [INFO] [stderr] Compiling kustomize-envcheck v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: field `kind` is never read [INFO] [stdout] --> src/k8s.rs:10:9 [INFO] [stdout] | [INFO] [stdout] 9 | pub struct K8sResource { [INFO] [stdout] | ----------- field in this struct [INFO] [stdout] 10 | pub kind: String, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `K8sResource` has derived impls for the traits `Debug` and `Clone`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `name` and `env_from_refs` are never read [INFO] [stdout] --> src/k8s.rs:17:9 [INFO] [stdout] | [INFO] [stdout] 16 | pub struct ContainerInfo { [INFO] [stdout] | ------------- fields in this struct [INFO] [stdout] 17 | pub name: String, [INFO] [stdout] | ^^^^ [INFO] [stdout] 18 | pub env_vars: HashMap, [INFO] [stdout] 19 | pub env_from_refs: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `ContainerInfo` has derived impls for the traits `Debug` and `Clone`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 1m 19s [INFO] running `Command { std: "docker" "inspect" "e10665c019c533d70d4f1e3575cb1a4bcda923b74c9fe65a3860fe4006f5f26c", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "e10665c019c533d70d4f1e3575cb1a4bcda923b74c9fe65a3860fe4006f5f26c", kill_on_drop: false }` [INFO] [stdout] e10665c019c533d70d4f1e3575cb1a4bcda923b74c9fe65a3860fe4006f5f26c [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+8de4c7234dd9b97c9d76b58671343fdbbc9a433e" "test" "--frozen" "--no-run" "--message-format=json" "--target" "x86_64-unknown-linux-musl", kill_on_drop: false }` [INFO] [stdout] fe0a1fe0a46450cfefaea674fe54b0ffcc602d6804f0219355e7d15dad53215b [INFO] running `Command { std: "docker" "start" "-a" "fe0a1fe0a46450cfefaea674fe54b0ffcc602d6804f0219355e7d15dad53215b", kill_on_drop: false }` [INFO] [stderr] Compiling kustomize-envcheck v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: field `kind` is never read [INFO] [stdout] --> src/k8s.rs:10:9 [INFO] [stdout] | [INFO] [stdout] 9 | pub struct K8sResource { [INFO] [stdout] | ----------- field in this struct [INFO] [stdout] 10 | pub kind: String, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `K8sResource` has derived impls for the traits `Debug` and `Clone`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `name` and `env_from_refs` are never read [INFO] [stdout] --> src/k8s.rs:17:9 [INFO] [stdout] | [INFO] [stdout] 16 | pub struct ContainerInfo { [INFO] [stdout] | ------------- fields in this struct [INFO] [stdout] 17 | pub name: String, [INFO] [stdout] | ^^^^ [INFO] [stdout] 18 | pub env_vars: HashMap, [INFO] [stdout] 19 | pub env_from_refs: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `ContainerInfo` has derived impls for the traits `Debug` and `Clone`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 1.14s [INFO] running `Command { std: "docker" "inspect" "fe0a1fe0a46450cfefaea674fe54b0ffcc602d6804f0219355e7d15dad53215b", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "fe0a1fe0a46450cfefaea674fe54b0ffcc602d6804f0219355e7d15dad53215b", kill_on_drop: false }` [INFO] [stdout] fe0a1fe0a46450cfefaea674fe54b0ffcc602d6804f0219355e7d15dad53215b [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+8de4c7234dd9b97c9d76b58671343fdbbc9a433e" "test" "--frozen" "--target" "x86_64-unknown-linux-musl", kill_on_drop: false }` [INFO] [stdout] c7c751a34a41db4dc38eab3f049d96f0ad937b9889ff17f0941e47f501fac576 [INFO] running `Command { std: "docker" "start" "-a" "c7c751a34a41db4dc38eab3f049d96f0ad937b9889ff17f0941e47f501fac576", kill_on_drop: false }` [INFO] [stderr] warning: field `kind` is never read [INFO] [stderr] --> src/k8s.rs:10:9 [INFO] [stderr] | [INFO] [stderr] 9 | pub struct K8sResource { [INFO] [stderr] | ----------- field in this struct [INFO] [stderr] 10 | pub kind: String, [INFO] [stderr] | ^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `K8sResource` has derived impls for the traits `Debug` and `Clone`, but these are intentionally ignored during dead code analysis [INFO] [stderr] = note: `#[warn(dead_code)]` on by default [INFO] [stderr] [INFO] [stderr] warning: fields `name` and `env_from_refs` are never read [INFO] [stderr] --> src/k8s.rs:17:9 [INFO] [stderr] | [INFO] [stderr] 16 | pub struct ContainerInfo { [INFO] [stderr] | ------------- fields in this struct [INFO] [stderr] 17 | pub name: String, [INFO] [stderr] | ^^^^ [INFO] [stderr] 18 | pub env_vars: HashMap, [INFO] [stderr] 19 | pub env_from_refs: Vec, [INFO] [stderr] | ^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `ContainerInfo` has derived impls for the traits `Debug` and `Clone`, but these are intentionally ignored during dead code analysis [INFO] [stderr] [INFO] [stderr] warning: `kustomize-envcheck` (bin "kustomize-envcheck" test) generated 2 warnings [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 0.12s [INFO] [stdout] [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stderr] Running unittests src/main.rs (/opt/rustwide/target/x86_64-unknown-linux-musl/debug/deps/kustomize_envcheck-dc6001feb6f90766) [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "c7c751a34a41db4dc38eab3f049d96f0ad937b9889ff17f0941e47f501fac576", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "c7c751a34a41db4dc38eab3f049d96f0ad937b9889ff17f0941e47f501fac576", kill_on_drop: false }` [INFO] [stdout] c7c751a34a41db4dc38eab3f049d96f0ad937b9889ff17f0941e47f501fac576