[INFO] fetching crate shielded 0.1.2... [INFO] testing shielded-0.1.2 against try#8de4c7234dd9b97c9d76b58671343fdbbc9a433e+target=x86_64-unknown-linux-musl for musl_upgrade_1_2_5_with_getrandom_patch_0 [INFO] extracting crate shielded 0.1.2 into /workspace/builds/worker-0-tc1/source [INFO] started tweaking crates.io crate shielded 0.1.2 [INFO] finished tweaking crates.io crate shielded 0.1.2 [INFO] tweaked toml for crates.io crate shielded 0.1.2 written to /workspace/builds/worker-0-tc1/source/Cargo.toml [INFO] validating manifest of crates.io crate shielded 0.1.2 on toolchain 8de4c7234dd9b97c9d76b58671343fdbbc9a433e [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+8de4c7234dd9b97c9d76b58671343fdbbc9a433e" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate crates.io crate shielded 0.1.2 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+8de4c7234dd9b97c9d76b58671343fdbbc9a433e" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] warning: `default_features` is deprecated in favor of `default-features` and will not work in the 2024 edition [INFO] [stderr] (in the `quickcheck` dependency) [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded ring v0.17.4 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+8de4c7234dd9b97c9d76b58671343fdbbc9a433e" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 341fc84f8f3ddafd8b74fc0fb527544e6e5ee552afd74caa5c4b9dfac63d0e07 [INFO] running `Command { std: "docker" "start" "-a" "341fc84f8f3ddafd8b74fc0fb527544e6e5ee552afd74caa5c4b9dfac63d0e07", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "341fc84f8f3ddafd8b74fc0fb527544e6e5ee552afd74caa5c4b9dfac63d0e07", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "341fc84f8f3ddafd8b74fc0fb527544e6e5ee552afd74caa5c4b9dfac63d0e07", kill_on_drop: false }` [INFO] [stdout] 341fc84f8f3ddafd8b74fc0fb527544e6e5ee552afd74caa5c4b9dfac63d0e07 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+8de4c7234dd9b97c9d76b58671343fdbbc9a433e" "build" "--frozen" "--message-format=json" "--target" "x86_64-unknown-linux-musl", kill_on_drop: false }` [INFO] [stdout] c53b22b8d7808087f7ec7ba1acf279323a1bb6237d113b4bfc537bb31ad3f08c [INFO] running `Command { std: "docker" "start" "-a" "c53b22b8d7808087f7ec7ba1acf279323a1bb6237d113b4bfc537bb31ad3f08c", kill_on_drop: false }` [INFO] [stderr] warning: `default_features` is deprecated in favor of `default-features` and will not work in the 2024 edition [INFO] [stderr] (in the `quickcheck` dependency) [INFO] [stderr] Compiling libc v0.2.149 [INFO] [stderr] Compiling spin v0.9.8 [INFO] [stderr] Compiling untrusted v0.9.0 [INFO] [stderr] Compiling cc v1.0.83 [INFO] [stderr] Compiling getrandom v0.2.10 [INFO] [stderr] Compiling ring v0.17.4 [INFO] [stderr] Compiling shielded v0.1.2 (/opt/rustwide/workdir) [INFO] [stdout] error: unnecessary qualification [INFO] [stdout] --> src/lib.rs:79:19 [INFO] [stdout] | [INFO] [stdout] 79 | let rng = ring::rand::SystemRandom::new(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] note: the lint level is defined here [INFO] [stdout] --> src/lib.rs:31:5 [INFO] [stdout] | [INFO] [stdout] 31 | unused_qualifications, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] help: remove the unnecessary path segments [INFO] [stdout] | [INFO] [stdout] 79 - let rng = ring::rand::SystemRandom::new(); [INFO] [stdout] 79 + let rng = SystemRandom::new(); [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unnecessary qualification [INFO] [stdout] --> src/lib.rs:137:19 [INFO] [stdout] | [INFO] [stdout] 137 | let rng = ring::rand::SystemRandom::new(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] help: remove the unnecessary path segments [INFO] [stdout] | [INFO] [stdout] 137 - let rng = ring::rand::SystemRandom::new(); [INFO] [stdout] 137 + let rng = SystemRandom::new(); [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: could not compile `shielded` (lib) due to 2 previous errors [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] running `Command { std: "docker" "inspect" "c53b22b8d7808087f7ec7ba1acf279323a1bb6237d113b4bfc537bb31ad3f08c", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "c53b22b8d7808087f7ec7ba1acf279323a1bb6237d113b4bfc537bb31ad3f08c", kill_on_drop: false }` [INFO] [stdout] c53b22b8d7808087f7ec7ba1acf279323a1bb6237d113b4bfc537bb31ad3f08c