[INFO] fetching crate google-networksecurity1-cli 5.0.4+20240221... [INFO] checking google-networksecurity1-cli-5.0.4+20240221 against master#506512391b1a75ae450d36c9420978402a91abcc for pr-125384 [INFO] extracting crate google-networksecurity1-cli 5.0.4+20240221 into /workspace/builds/worker-7-tc1/source [INFO] validating manifest of crates.io crate google-networksecurity1-cli 5.0.4+20240221 on toolchain 506512391b1a75ae450d36c9420978402a91abcc [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+506512391b1a75ae450d36c9420978402a91abcc" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate google-networksecurity1-cli 5.0.4+20240221 [INFO] finished tweaking crates.io crate google-networksecurity1-cli 5.0.4+20240221 [INFO] tweaked toml for crates.io crate google-networksecurity1-cli 5.0.4+20240221 written to /workspace/builds/worker-7-tc1/source/Cargo.toml [INFO] crate crates.io crate google-networksecurity1-cli 5.0.4+20240221 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+506512391b1a75ae450d36c9420978402a91abcc" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] warning: version requirement `5.0.4+20240221` for dependency `google-networksecurity1` includes semver metadata which will be ignored, removing the metadata is recommended to avoid confusion [INFO] [stderr] Updating crates.io index [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded google-networksecurity1 v5.0.4+20240221 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:59a85a07ab18ca8720692f8e61effa1c651d9e2ca591e072c2b212bb91a6b8b5" "/opt/rustwide/cargo-home/bin/cargo" "+506512391b1a75ae450d36c9420978402a91abcc" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 7a70010fa6e108253aac6260bfaf911683795e61da3e56c3c404f5497f6ca1a5 [INFO] running `Command { std: "docker" "start" "-a" "7a70010fa6e108253aac6260bfaf911683795e61da3e56c3c404f5497f6ca1a5", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "7a70010fa6e108253aac6260bfaf911683795e61da3e56c3c404f5497f6ca1a5", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "7a70010fa6e108253aac6260bfaf911683795e61da3e56c3c404f5497f6ca1a5", kill_on_drop: false }` [INFO] [stdout] 7a70010fa6e108253aac6260bfaf911683795e61da3e56c3c404f5497f6ca1a5 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=allow" "-e" "RUSTDOCFLAGS=--cap-lints=allow" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:59a85a07ab18ca8720692f8e61effa1c651d9e2ca591e072c2b212bb91a6b8b5" "/opt/rustwide/cargo-home/bin/cargo" "+506512391b1a75ae450d36c9420978402a91abcc" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 60d573be829d3c4d02c71ff5d790761716e80d3135f0f6ec3ed84453d4ed4e13 [INFO] running `Command { std: "docker" "start" "-a" "60d573be829d3c4d02c71ff5d790761716e80d3135f0f6ec3ed84453d4ed4e13", kill_on_drop: false }` [INFO] [stderr] warning: version requirement `5.0.4+20240221` for dependency `google-networksecurity1` includes semver metadata which will be ignored, removing the metadata is recommended to avoid confusion [INFO] [stderr] Checking hyper v0.14.28 [INFO] [stderr] Checking time v0.3.34 [INFO] [stdout] error[E0282]: type annotations needed for `Box<_>` [INFO] [stdout] --> /opt/rustwide/cargo-home/registry/src/index.crates.io-6f17d22bba15001f/time-0.3.34/src/format_description/parse/mod.rs:83:9 [INFO] [stdout] | [INFO] [stdout] 83 | let items = format_items [INFO] [stdout] | ^^^^^ [INFO] [stdout] ... [INFO] [stdout] 86 | Ok(items.into()) [INFO] [stdout] | ---- type must be known at this point [INFO] [stdout] | [INFO] [stdout] help: consider giving `items` an explicit type, where the placeholders `_` are specified [INFO] [stdout] | [INFO] [stdout] 83 | let items: Box<_> = format_items [INFO] [stdout] | ++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 1 previous error [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0282`. [INFO] [stdout] [INFO] [stderr] error: could not compile `time` (lib) due to 2 previous errors [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] running `Command { std: "docker" "inspect" "60d573be829d3c4d02c71ff5d790761716e80d3135f0f6ec3ed84453d4ed4e13", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "60d573be829d3c4d02c71ff5d790761716e80d3135f0f6ec3ed84453d4ed4e13", kill_on_drop: false }` [INFO] [stdout] 60d573be829d3c4d02c71ff5d790761716e80d3135f0f6ec3ed84453d4ed4e13 [INFO] checking google-networksecurity1-cli-5.0.4+20240221 against try#dae34b759e282c069aa28752564694effd121a63 for pr-125384 [INFO] extracting crate google-networksecurity1-cli 5.0.4+20240221 into /workspace/builds/worker-7-tc2/source [INFO] validating manifest of crates.io crate google-networksecurity1-cli 5.0.4+20240221 on toolchain dae34b759e282c069aa28752564694effd121a63 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+dae34b759e282c069aa28752564694effd121a63" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate google-networksecurity1-cli 5.0.4+20240221 [INFO] finished tweaking crates.io crate google-networksecurity1-cli 5.0.4+20240221 [INFO] tweaked toml for crates.io crate google-networksecurity1-cli 5.0.4+20240221 written to /workspace/builds/worker-7-tc2/source/Cargo.toml [INFO] crate crates.io crate google-networksecurity1-cli 5.0.4+20240221 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+dae34b759e282c069aa28752564694effd121a63" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] warning: version requirement `5.0.4+20240221` for dependency `google-networksecurity1` includes semver metadata which will be ignored, removing the metadata is recommended to avoid confusion [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:59a85a07ab18ca8720692f8e61effa1c651d9e2ca591e072c2b212bb91a6b8b5" "/opt/rustwide/cargo-home/bin/cargo" "+dae34b759e282c069aa28752564694effd121a63" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] bebb97e1d6b23b68b19dcb1c46a7bf6dd13b0285527736e32cb00c9ae1d596e9 [INFO] running `Command { std: "docker" "start" "-a" "bebb97e1d6b23b68b19dcb1c46a7bf6dd13b0285527736e32cb00c9ae1d596e9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "bebb97e1d6b23b68b19dcb1c46a7bf6dd13b0285527736e32cb00c9ae1d596e9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "bebb97e1d6b23b68b19dcb1c46a7bf6dd13b0285527736e32cb00c9ae1d596e9", kill_on_drop: false }` [INFO] [stdout] bebb97e1d6b23b68b19dcb1c46a7bf6dd13b0285527736e32cb00c9ae1d596e9 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=allow" "-e" "RUSTDOCFLAGS=--cap-lints=allow" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:59a85a07ab18ca8720692f8e61effa1c651d9e2ca591e072c2b212bb91a6b8b5" "/opt/rustwide/cargo-home/bin/cargo" "+dae34b759e282c069aa28752564694effd121a63" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] b1e2bfd218736f5c79b7784ce70138de96fce6c780598cc10500d0151c184bcc [INFO] running `Command { std: "docker" "start" "-a" "b1e2bfd218736f5c79b7784ce70138de96fce6c780598cc10500d0151c184bcc", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] skipping non-2021 edition `2018` [INFO] running `Command { std: "docker" "inspect" "b1e2bfd218736f5c79b7784ce70138de96fce6c780598cc10500d0151c184bcc", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "b1e2bfd218736f5c79b7784ce70138de96fce6c780598cc10500d0151c184bcc", kill_on_drop: false }` [INFO] [stdout] b1e2bfd218736f5c79b7784ce70138de96fce6c780598cc10500d0151c184bcc