[INFO] fetching crate ripple-keypairs 0.1.0... [INFO] checking ripple-keypairs-0.1.0 against try#23ffd2897cbb44320ca18dfe4d05dbacb37d55e0 for pr-115950 [INFO] extracting crate ripple-keypairs 0.1.0 into /workspace/builds/worker-4-tc2/source [INFO] validating manifest of crates.io crate ripple-keypairs 0.1.0 on toolchain 23ffd2897cbb44320ca18dfe4d05dbacb37d55e0 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+23ffd2897cbb44320ca18dfe4d05dbacb37d55e0" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate ripple-keypairs 0.1.0 [INFO] finished tweaking crates.io crate ripple-keypairs 0.1.0 [INFO] tweaked toml for crates.io crate ripple-keypairs 0.1.0 written to /workspace/builds/worker-4-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+23ffd2897cbb44320ca18dfe4d05dbacb37d55e0" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+23ffd2897cbb44320ca18dfe4d05dbacb37d55e0" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4f8da3c744d2da974e54ce020a79f4ad54313e914ebeaab8fc086f07e8d8b066" "/opt/rustwide/cargo-home/bin/cargo" "+23ffd2897cbb44320ca18dfe4d05dbacb37d55e0" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 5dc141be41a498d2c71b9456cf75e96161a97666b6dbb78b8732f1378b62cdc2 [INFO] running `Command { std: "docker" "start" "-a" "5dc141be41a498d2c71b9456cf75e96161a97666b6dbb78b8732f1378b62cdc2", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "5dc141be41a498d2c71b9456cf75e96161a97666b6dbb78b8732f1378b62cdc2", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "5dc141be41a498d2c71b9456cf75e96161a97666b6dbb78b8732f1378b62cdc2", kill_on_drop: false }` [INFO] [stdout] 5dc141be41a498d2c71b9456cf75e96161a97666b6dbb78b8732f1378b62cdc2 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4f8da3c744d2da974e54ce020a79f4ad54313e914ebeaab8fc086f07e8d8b066" "/opt/rustwide/cargo-home/bin/cargo" "+23ffd2897cbb44320ca18dfe4d05dbacb37d55e0" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 6cbba75798f3818daa5f58355af2a3556090456122998798e6f825a1cdb69f94 [INFO] running `Command { std: "docker" "start" "-a" "6cbba75798f3818daa5f58355af2a3556090456122998798e6f825a1cdb69f94", kill_on_drop: false }` [INFO] [stderr] Checking subtle v1.0.0 [INFO] [stderr] Compiling crunchy v0.2.2 [INFO] [stderr] Compiling libc v0.2.148 [INFO] [stderr] Compiling num-traits v0.2.16 [INFO] [stderr] Compiling num-integer v0.1.45 [INFO] [stderr] Compiling num-bigint v0.3.3 [INFO] [stderr] Checking base-x v0.2.11 [INFO] [stderr] Checking arrayref v0.3.7 [INFO] [stderr] Checking subtle v2.5.0 [INFO] [stderr] Checking sha2 v0.8.2 [INFO] [stderr] Checking ripemd160 v0.9.1 [INFO] [stderr] Checking crypto-mac v0.7.0 [INFO] [stderr] Checking hmac v0.7.1 [INFO] [stderr] Checking hmac-drbg v0.2.0 [INFO] [stderr] Compiling cc v1.0.83 [INFO] [stderr] Checking getrandom v0.1.16 [INFO] [stderr] Checking rand_core v0.5.1 [INFO] [stderr] Checking rand_chacha v0.2.2 [INFO] [stderr] Checking rand v0.7.3 [INFO] [stderr] Compiling ring v0.16.20 [INFO] [stderr] Checking libsecp256k1 v0.3.5 [INFO] [stderr] Checking ripple-address-codec v0.1.1 [INFO] [stderr] Checking ripple-keypairs v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] error[E0597]: `private` does not live long enough [INFO] [stdout] --> tests/api.rs:119:13 [INFO] [stdout] | [INFO] [stdout] 116 | let (private, _) = seed.derive_keypair().unwrap(); [INFO] [stdout] | ------- binding `private` declared here [INFO] [stdout] ... [INFO] [stdout] 119 | private.sign(&TEST_SECP256K1.message).to_string(), [INFO] [stdout] | ^^^^^^^------------------------------ [INFO] [stdout] | | [INFO] [stdout] | borrowed value does not live long enough [INFO] [stdout] | a temporary with access to the borrow is created here ... [INFO] [stdout] ... [INFO] [stdout] 122 | } [INFO] [stdout] | - [INFO] [stdout] | | [INFO] [stdout] | `private` dropped here while still borrowed [INFO] [stdout] | ... and the borrow might be used here, when that temporary is dropped and runs the destructor for type `impl Signature` [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0597]: `private` does not live long enough [INFO] [stdout] --> tests/api.rs:231:13 [INFO] [stdout] | [INFO] [stdout] 228 | let (private, _) = seed.derive_keypair().unwrap(); [INFO] [stdout] | ------- binding `private` declared here [INFO] [stdout] ... [INFO] [stdout] 231 | private.sign(&TEST_ED25519.message).to_string(), [INFO] [stdout] | ^^^^^^^---------------------------- [INFO] [stdout] | | [INFO] [stdout] | borrowed value does not live long enough [INFO] [stdout] | a temporary with access to the borrow is created here ... [INFO] [stdout] ... [INFO] [stdout] 234 | } [INFO] [stdout] | - [INFO] [stdout] | | [INFO] [stdout] | `private` dropped here while still borrowed [INFO] [stdout] | ... and the borrow might be used here, when that temporary is dropped and runs the destructor for type `impl Signature` [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 2 previous errors [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0597`. [INFO] [stdout] [INFO] [stderr] error: could not compile `ripple-keypairs` (test "api") due to 3 previous errors [INFO] running `Command { std: "docker" "inspect" "6cbba75798f3818daa5f58355af2a3556090456122998798e6f825a1cdb69f94", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "6cbba75798f3818daa5f58355af2a3556090456122998798e6f825a1cdb69f94", kill_on_drop: false }` [INFO] [stdout] 6cbba75798f3818daa5f58355af2a3556090456122998798e6f825a1cdb69f94