[INFO] fetching crate serde-with-expand-env 1.1.0... [INFO] checking serde-with-expand-env-1.1.0 against master#22572d0994593197593e2a1b7b18d720a9a349a7 for pr-126452-1 [INFO] extracting crate serde-with-expand-env 1.1.0 into /workspace/builds/worker-6-tc1/source [INFO] validating manifest of crates.io crate serde-with-expand-env 1.1.0 on toolchain 22572d0994593197593e2a1b7b18d720a9a349a7 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+22572d0994593197593e2a1b7b18d720a9a349a7" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate serde-with-expand-env 1.1.0 [INFO] finished tweaking crates.io crate serde-with-expand-env 1.1.0 [INFO] tweaked toml for crates.io crate serde-with-expand-env 1.1.0 written to /workspace/builds/worker-6-tc1/source/Cargo.toml [INFO] crate crates.io crate serde-with-expand-env 1.1.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+22572d0994593197593e2a1b7b18d720a9a349a7" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded dirs-sys v0.3.4 [INFO] [stderr] Downloaded redox_syscall v0.1.56 [INFO] [stderr] Downloaded itoa v0.4.5 [INFO] [stderr] Downloaded syn v1.0.14 [INFO] [stderr] Downloaded ryu v1.0.2 [INFO] [stderr] Downloaded serde v1.0.104 [INFO] [stderr] Downloaded serde_json v1.0.48 [INFO] [stderr] Downloaded serde_derive v1.0.104 [INFO] [stderr] Downloaded shellexpand v2.0.0 [INFO] [stderr] Downloaded proc-macro2 v1.0.8 [INFO] [stderr] Downloaded libc v0.2.67 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:923055f121b5182466d55868a8b05e67af8ba4a3a3f6bad814e953ca3cd3ac2a" "/opt/rustwide/cargo-home/bin/cargo" "+22572d0994593197593e2a1b7b18d720a9a349a7" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] b035c8fb27a0f894bcf994f29a3211a4b8d3c2734136c59ce8edb1bb8e772802 [INFO] running `Command { std: "docker" "start" "-a" "b035c8fb27a0f894bcf994f29a3211a4b8d3c2734136c59ce8edb1bb8e772802", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "b035c8fb27a0f894bcf994f29a3211a4b8d3c2734136c59ce8edb1bb8e772802", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "b035c8fb27a0f894bcf994f29a3211a4b8d3c2734136c59ce8edb1bb8e772802", kill_on_drop: false }` [INFO] [stdout] b035c8fb27a0f894bcf994f29a3211a4b8d3c2734136c59ce8edb1bb8e772802 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:923055f121b5182466d55868a8b05e67af8ba4a3a3f6bad814e953ca3cd3ac2a" "/opt/rustwide/cargo-home/bin/cargo" "+22572d0994593197593e2a1b7b18d720a9a349a7" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 199f62c38f664b66b9f4488e3741e3bd9199a54af7a6dba53d3aa17908b9c059 [INFO] running `Command { std: "docker" "start" "-a" "199f62c38f664b66b9f4488e3741e3bd9199a54af7a6dba53d3aa17908b9c059", kill_on_drop: false }` [INFO] [stderr] Compiling proc-macro2 v1.0.8 [INFO] [stderr] Compiling syn v1.0.14 [INFO] [stderr] Compiling libc v0.2.67 [INFO] [stderr] Compiling serde v1.0.104 [INFO] [stderr] Compiling ryu v1.0.2 [INFO] [stderr] Checking itoa v0.4.5 [INFO] [stderr] Checking dirs-sys v0.3.4 [INFO] [stderr] Compiling quote v1.0.2 [INFO] [stderr] Checking dirs v2.0.2 [INFO] [stderr] Checking shellexpand v2.0.0 [INFO] [stderr] Compiling serde_derive v1.0.104 [INFO] [stderr] Checking toml v0.5.6 [INFO] [stderr] Checking serde_json v1.0.48 [INFO] [stderr] Checking serde-with-expand-env v1.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: fields `number` and `string` are never read [INFO] [stdout] --> examples/serde_toml.rs:8:5 [INFO] [stdout] | [INFO] [stdout] 6 | struct Inner { [INFO] [stdout] | ----- fields in this struct [INFO] [stdout] 7 | #[serde(deserialize_with = "with_expand_envs")] [INFO] [stdout] 8 | number: f32, [INFO] [stdout] | ^^^^^^ [INFO] [stdout] 9 | #[serde(deserialize_with = "with_expand_envs")] [INFO] [stdout] 10 | string: String, [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `Inner` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `name` and `inner` are never read [INFO] [stdout] --> examples/serde_toml.rs:16:5 [INFO] [stdout] | [INFO] [stdout] 14 | struct Test { [INFO] [stdout] | ---- fields in this struct [INFO] [stdout] 15 | #[serde(deserialize_with = "with_expand_envs")] [INFO] [stdout] 16 | name: String, [INFO] [stdout] | ^^^^ [INFO] [stdout] 17 | inner: Vec, [INFO] [stdout] | ^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `Test` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `number`, `string`, and `with_defaut` are never read [INFO] [stdout] --> examples/serde_json.rs:9:5 [INFO] [stdout] | [INFO] [stdout] 7 | struct Test { [INFO] [stdout] | ---- fields in this struct [INFO] [stdout] 8 | #[serde(deserialize_with = "with_expand_envs")] [INFO] [stdout] 9 | number: usize, [INFO] [stdout] | ^^^^^^ [INFO] [stdout] 10 | #[serde(deserialize_with = "with_expand_envs")] [INFO] [stdout] 11 | string: String, [INFO] [stdout] | ^^^^^^ [INFO] [stdout] 12 | #[serde(deserialize_with = "with_expand_envs")] [INFO] [stdout] 13 | with_defaut: String, [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `Test` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 2 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 10.92s [INFO] running `Command { std: "docker" "inspect" "199f62c38f664b66b9f4488e3741e3bd9199a54af7a6dba53d3aa17908b9c059", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "199f62c38f664b66b9f4488e3741e3bd9199a54af7a6dba53d3aa17908b9c059", kill_on_drop: false }` [INFO] [stdout] 199f62c38f664b66b9f4488e3741e3bd9199a54af7a6dba53d3aa17908b9c059 [INFO] checking serde-with-expand-env-1.1.0 against try#6289438dbad80b1a0029c66dd3f6abf57c2c51be for pr-126452-1 [INFO] extracting crate serde-with-expand-env 1.1.0 into /workspace/builds/worker-6-tc2/source [INFO] validating manifest of crates.io crate serde-with-expand-env 1.1.0 on toolchain 6289438dbad80b1a0029c66dd3f6abf57c2c51be [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+6289438dbad80b1a0029c66dd3f6abf57c2c51be" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate serde-with-expand-env 1.1.0 [INFO] finished tweaking crates.io crate serde-with-expand-env 1.1.0 [INFO] tweaked toml for crates.io crate serde-with-expand-env 1.1.0 written to /workspace/builds/worker-6-tc2/source/Cargo.toml [INFO] crate crates.io crate serde-with-expand-env 1.1.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+6289438dbad80b1a0029c66dd3f6abf57c2c51be" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:923055f121b5182466d55868a8b05e67af8ba4a3a3f6bad814e953ca3cd3ac2a" "/opt/rustwide/cargo-home/bin/cargo" "+6289438dbad80b1a0029c66dd3f6abf57c2c51be" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] edba33080cee749a0aab272c512bcd42c07612159ba7e4a99a35262c5b127d58 [INFO] running `Command { std: "docker" "start" "-a" "edba33080cee749a0aab272c512bcd42c07612159ba7e4a99a35262c5b127d58", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "edba33080cee749a0aab272c512bcd42c07612159ba7e4a99a35262c5b127d58", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "edba33080cee749a0aab272c512bcd42c07612159ba7e4a99a35262c5b127d58", kill_on_drop: false }` [INFO] [stdout] edba33080cee749a0aab272c512bcd42c07612159ba7e4a99a35262c5b127d58 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:923055f121b5182466d55868a8b05e67af8ba4a3a3f6bad814e953ca3cd3ac2a" "/opt/rustwide/cargo-home/bin/cargo" "+6289438dbad80b1a0029c66dd3f6abf57c2c51be" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 2bdac8df9546a322b63e79e2e139b331384bd6e6a0c4826165f363d9eb49dfe4 [INFO] running `Command { std: "docker" "start" "-a" "2bdac8df9546a322b63e79e2e139b331384bd6e6a0c4826165f363d9eb49dfe4", kill_on_drop: false }` [INFO] [stderr] Compiling proc-macro2 v1.0.8 [INFO] [stderr] Compiling syn v1.0.14 [INFO] [stderr] Compiling libc v0.2.67 [INFO] [stderr] Compiling serde v1.0.104 [INFO] [stderr] Compiling ryu v1.0.2 [INFO] [stderr] Checking itoa v0.4.5 [INFO] [stderr] Checking dirs-sys v0.3.4 [INFO] [stderr] Compiling quote v1.0.2 [INFO] [stderr] Checking dirs v2.0.2 [INFO] [stderr] Checking shellexpand v2.0.0 [INFO] [stderr] Compiling serde_derive v1.0.104 [INFO] [stderr] Checking serde_json v1.0.48 [INFO] [stderr] Checking toml v0.5.6 [INFO] [stderr] Checking serde-with-expand-env v1.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: fields `number`, `string`, and `with_defaut` are never read [INFO] [stdout] --> examples/serde_json.rs:9:5 [INFO] [stdout] | [INFO] [stdout] 7 | struct Test { [INFO] [stdout] | ---- fields in this struct [INFO] [stdout] 8 | #[serde(deserialize_with = "with_expand_envs")] [INFO] [stdout] 9 | number: usize, [INFO] [stdout] | ^^^^^^ [INFO] [stdout] 10 | #[serde(deserialize_with = "with_expand_envs")] [INFO] [stdout] 11 | string: String, [INFO] [stdout] | ^^^^^^ [INFO] [stdout] 12 | #[serde(deserialize_with = "with_expand_envs")] [INFO] [stdout] 13 | with_defaut: String, [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `Test` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `number` and `string` are never read [INFO] [stdout] --> examples/serde_toml.rs:8:5 [INFO] [stdout] | [INFO] [stdout] 6 | struct Inner { [INFO] [stdout] | ----- fields in this struct [INFO] [stdout] 7 | #[serde(deserialize_with = "with_expand_envs")] [INFO] [stdout] 8 | number: f32, [INFO] [stdout] | ^^^^^^ [INFO] [stdout] 9 | #[serde(deserialize_with = "with_expand_envs")] [INFO] [stdout] 10 | string: String, [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `Inner` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `name` and `inner` are never read [INFO] [stdout] --> examples/serde_toml.rs:16:5 [INFO] [stdout] | [INFO] [stdout] 14 | struct Test { [INFO] [stdout] | ---- fields in this struct [INFO] [stdout] 15 | #[serde(deserialize_with = "with_expand_envs")] [INFO] [stdout] 16 | name: String, [INFO] [stdout] | ^^^^ [INFO] [stdout] 17 | inner: Vec, [INFO] [stdout] | ^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `Test` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 2 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 12.39s [INFO] running `Command { std: "docker" "inspect" "2bdac8df9546a322b63e79e2e139b331384bd6e6a0c4826165f363d9eb49dfe4", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "2bdac8df9546a322b63e79e2e139b331384bd6e6a0c4826165f363d9eb49dfe4", kill_on_drop: false }` [INFO] [stdout] 2bdac8df9546a322b63e79e2e139b331384bd6e6a0c4826165f363d9eb49dfe4