[INFO] fetching crate ci_info 0.14.14... [INFO] checking ci_info-0.14.14 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate ci_info 0.14.14 into /workspace/builds/worker-6-tc2/source [INFO] validating manifest of crates.io crate ci_info 0.14.14 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate ci_info 0.14.14 [INFO] finished tweaking crates.io crate ci_info 0.14.14 [INFO] tweaked toml for crates.io crate ci_info 0.14.14 written to /workspace/builds/worker-6-tc2/source/Cargo.toml [INFO] crate crates.io crate ci_info 0.14.14 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 52e07d24f706bbbfa783b55ae62623231dbaac74aeb0be37001073e750ef7afd [INFO] running `Command { std: "docker" "start" "-a" "52e07d24f706bbbfa783b55ae62623231dbaac74aeb0be37001073e750ef7afd", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "52e07d24f706bbbfa783b55ae62623231dbaac74aeb0be37001073e750ef7afd", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "52e07d24f706bbbfa783b55ae62623231dbaac74aeb0be37001073e750ef7afd", kill_on_drop: false }` [INFO] [stdout] 52e07d24f706bbbfa783b55ae62623231dbaac74aeb0be37001073e750ef7afd [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] d5ee5954483b3dfb8d8375b1a8383de8c81b601d13691f24f66f9751c3e99446 [INFO] running `Command { std: "docker" "start" "-a" "d5ee5954483b3dfb8d8375b1a8383de8c81b601d13691f24f66f9751c3e99446", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Fixed Cargo.toml (2 fixes) [INFO] [stderr] Compiling autocfg v1.1.0 [INFO] [stderr] Checking hashbrown v0.12.3 [INFO] [stderr] Checking fsio v0.4.0 [INFO] [stderr] Compiling doc-comment v0.3.3 [INFO] [stderr] Checking lazy_static v1.4.0 [INFO] [stderr] Compiling indexmap v1.9.3 [INFO] [stderr] Checking envmnt v0.10.4 [INFO] [stderr] Checking ci_info v0.14.14 (/tmp/fixit) [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] Fixed src/lib.rs (1 fix) [INFO] [stdout] warning: lint `byte_slice_in_packed_struct_with_derive` has been removed: converted into hard error, see issue #107457 for more information [INFO] [stdout] --> src/lib.rs:12:5 [INFO] [stdout] | [INFO] [stdout] 12 | byte_slice_in_packed_struct_with_derive, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(renamed_and_removed_lints)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `illegal_floating_point_literal_pattern` has been removed: no longer a warning, float patterns behave the same as `==` [INFO] [stdout] --> src/lib.rs:43:5 [INFO] [stdout] | [INFO] [stdout] 43 | illegal_floating_point_literal_pattern, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `implied_bounds_entailment` has been removed: converted into hard error, see PR #117984 for more information [INFO] [stdout] --> src/lib.rs:44:5 [INFO] [stdout] | [INFO] [stdout] 44 | implied_bounds_entailment, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `indirect_structural_match` has been removed: converted into hard error, see RFC #3535 for more information [INFO] [stdout] --> src/lib.rs:49:5 [INFO] [stdout] | [INFO] [stdout] 49 | indirect_structural_match, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `invalid_alignment` has been removed: converted into hard error, see PR #104616 for more information [INFO] [stdout] --> src/lib.rs:52:5 [INFO] [stdout] | [INFO] [stdout] 52 | invalid_alignment, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `nontrivial_structural_match` has been removed: no longer needed, see RFC #3535 for more information [INFO] [stdout] --> src/lib.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | nontrivial_structural_match, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `pointer_structural_match` has been removed: converted into hard error, see RFC #3535 for more information [INFO] [stdout] --> src/lib.rs:92:5 [INFO] [stdout] | [INFO] [stdout] 92 | pointer_structural_match, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `private_in_public` has been removed: replaced with another group of lints, see RFC for more information [INFO] [stdout] --> src/lib.rs:93:5 [INFO] [stdout] | [INFO] [stdout] 93 | private_in_public, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unknown lint: `proc_macro_back_compat` [INFO] [stdout] --> src/lib.rs:94:5 [INFO] [stdout] | [INFO] [stdout] 94 | proc_macro_back_compat, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unknown_lints)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `suspicious_auto_trait_impls` has been removed: no longer needed, see issue #93367 for more information [INFO] [stdout] --> src/lib.rs:107:5 [INFO] [stdout] | [INFO] [stdout] 107 | suspicious_auto_trait_impls, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `where_clauses_object_safety` has been removed: converted into hard error, see PR #125380 for more information [INFO] [stdout] --> src/lib.rs:159:5 [INFO] [stdout] | [INFO] [stdout] 159 | where_clauses_object_safety, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `box_pointers` has been removed: it does not detect other kinds of allocations, and existed only for historical reasons [INFO] [stdout] --> src/lib.rs:165:5 [INFO] [stdout] | [INFO] [stdout] 165 | box_pointers, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 12 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Migrating benches/bench_get.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `ci_info` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/./ci_test.rs [INFO] [stderr] * src/lib.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] warning: lint `byte_slice_in_packed_struct_with_derive` has been removed: converted into hard error, see issue #107457 for more information [INFO] [stderr] --> src/lib.rs:12:5 [INFO] [stderr] | [INFO] [stderr] 12 | byte_slice_in_packed_struct_with_derive, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(renamed_and_removed_lints)]` on by default [INFO] [stderr] [INFO] [stderr] warning: lint `illegal_floating_point_literal_pattern` has been removed: no longer a warning, float patterns behave the same as `==` [INFO] [stderr] --> src/lib.rs:43:5 [INFO] [stderr] | [INFO] [stderr] 43 | illegal_floating_point_literal_pattern, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: lint `implied_bounds_entailment` has been removed: converted into hard error, see PR #117984 for more information [INFO] [stderr] --> src/lib.rs:44:5 [INFO] [stderr] | [INFO] [stderr] 44 | implied_bounds_entailment, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: lint `indirect_structural_match` has been removed: converted into hard error, see RFC #3535 for more information [INFO] [stderr] --> src/lib.rs:49:5 [INFO] [stderr] | [INFO] [stderr] 49 | indirect_structural_match, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: lint `invalid_alignment` has been removed: converted into hard error, see PR #104616 for more information [INFO] [stderr] --> src/lib.rs:52:5 [INFO] [stderr] | [INFO] [stderr] 52 | invalid_alignment, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: lint `nontrivial_structural_match` has been removed: no longer needed, see RFC #3535 for more information [INFO] [stderr] --> src/lib.rs:84:5 [INFO] [stderr] | [INFO] [stderr] 84 | nontrivial_structural_match, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: lint `pointer_structural_match` has been removed: converted into hard error, see RFC #3535 for more information [INFO] [stderr] --> src/lib.rs:92:5 [INFO] [stderr] | [INFO] [stderr] 92 | pointer_structural_match, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: lint `private_in_public` has been removed: replaced with another group of lints, see RFC for more information [INFO] [stderr] --> src/lib.rs:93:5 [INFO] [stderr] | [INFO] [stderr] 93 | private_in_public, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unknown lint: `proc_macro_back_compat` [INFO] [stderr] --> src/lib.rs:94:5 [INFO] [stderr] | [INFO] [stderr] 94 | proc_macro_back_compat, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unknown_lints)]` on by default [INFO] [stderr] [INFO] [stderr] warning: lint `suspicious_auto_trait_impls` has been removed: no longer needed, see issue #93367 for more information [INFO] [stderr] --> src/lib.rs:107:5 [INFO] [stderr] | [INFO] [stderr] 107 | suspicious_auto_trait_impls, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: lint `where_clauses_object_safety` has been removed: converted into hard error, see PR #125380 for more information [INFO] [stderr] --> src/lib.rs:159:5 [INFO] [stderr] | [INFO] [stderr] 159 | where_clauses_object_safety, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: lint `box_pointers` has been removed: it does not detect other kinds of allocations, and existed only for historical reasons [INFO] [stderr] --> src/lib.rs:165:5 [INFO] [stderr] | [INFO] [stderr] 165 | box_pointers, [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] error: usage of an `unsafe` block [INFO] [stderr] --> src/./ci_test.rs:8:5 [INFO] [stderr] | [INFO] [stderr] 8 | unsafe { env::set_var("VALIDATE_EXISTS_TRUE", "") }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] note: the lint level is defined here [INFO] [stderr] --> src/lib.rs:129:5 [INFO] [stderr] | [INFO] [stderr] 129 | unsafe_code, [INFO] [stderr] | ^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] error: usage of an `unsafe` block [INFO] [stderr] --> src/./ci_test.rs:22:5 [INFO] [stderr] | [INFO] [stderr] 22 | unsafe { env::set_var("VALIDATE_ALL_EXISTS_TRUE1", "") }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] error: usage of an `unsafe` block [INFO] [stderr] --> src/./ci_test.rs:24:5 [INFO] [stderr] | [INFO] [stderr] 24 | unsafe { env::set_var("VALIDATE_ALL_EXISTS_TRUE2", "") }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] error: usage of an `unsafe` block [INFO] [stderr] --> src/./ci_test.rs:35:5 [INFO] [stderr] | [INFO] [stderr] 35 | unsafe { env::set_var("VALIDATE_ALL_EXISTS_FALSE1", "") }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] error: usage of an `unsafe` block [INFO] [stdout] warning: lint `byte_slice_in_packed_struct_with_derive` has been removed: converted into hard error, see issue #107457 for more information [INFO] [stdout] --> src/lib.rs:12:5 [INFO] [stdout] | [INFO] [stdout] 12 | byte_slice_in_packed_struct_with_derive, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(renamed_and_removed_lints)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] --> src/./ci_test.rs:46:5 [INFO] [stdout] warning: lint `illegal_floating_point_literal_pattern` has been removed: no longer a warning, float patterns behave the same as `==` [INFO] [stdout] --> src/lib.rs:43:5 [INFO] [stdout] | [INFO] [stdout] 43 | illegal_floating_point_literal_pattern, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stdout] warning: lint `implied_bounds_entailment` has been removed: converted into hard error, see PR #117984 for more information [INFO] [stdout] --> src/lib.rs:44:5 [INFO] [stdout] | [INFO] [stdout] 44 | implied_bounds_entailment, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] 46 | unsafe { env::set_var("VALIDATE_ANY_EXISTS_TRUE2", "") }; [INFO] [stdout] warning: lint `indirect_structural_match` has been removed: converted into hard error, see RFC #3535 for more information [INFO] [stdout] --> src/lib.rs:49:5 [INFO] [stdout] | [INFO] [stdout] 49 | indirect_structural_match, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] warning: lint `invalid_alignment` has been removed: converted into hard error, see PR #104616 for more information [INFO] [stdout] --> src/lib.rs:52:5 [INFO] [stdout] | [INFO] [stdout] 52 | invalid_alignment, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] [INFO] [stdout] warning: lint `nontrivial_structural_match` has been removed: no longer needed, see RFC #3535 for more information [INFO] [stdout] --> src/lib.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | nontrivial_structural_match, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: usage of an `unsafe` block [INFO] [stdout] warning: lint `pointer_structural_match` has been removed: converted into hard error, see RFC #3535 for more information [INFO] [stdout] --> src/lib.rs:92:5 [INFO] [stdout] | [INFO] [stdout] 92 | pointer_structural_match, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] --> src/./ci_test.rs:66:5 [INFO] [stdout] warning: lint `private_in_public` has been removed: replaced with another group of lints, see RFC for more information [INFO] [stdout] --> src/lib.rs:93:5 [INFO] [stdout] | [INFO] [stdout] 93 | private_in_public, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stdout] warning: unknown lint: `proc_macro_back_compat` [INFO] [stdout] --> src/lib.rs:94:5 [INFO] [stdout] | [INFO] [stdout] 94 | proc_macro_back_compat, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unknown_lints)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] 66 | unsafe { env::set_var("VALIDATE_VALUE_TRUE", "test") }; [INFO] [stdout] warning: lint `suspicious_auto_trait_impls` has been removed: no longer needed, see issue #93367 for more information [INFO] [stdout] --> src/lib.rs:107:5 [INFO] [stdout] | [INFO] [stdout] 107 | suspicious_auto_trait_impls, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] error: usage of an `unsafe` block [INFO] [stderr] --> src/./ci_test.rs:77:5 [INFO] [stderr] | [INFO] [stderr] 77 | unsafe { env::set_var("VALIDATE_VALUE_DIFFERENT", "test1") }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] error: usage of an `unsafe` block [INFO] [stderr] --> src/./ci_test.rs:97:5 [INFO] [stderr] | [INFO] [stderr] 97 | unsafe { env::set_var("VALIDATE_NOT_EQUAL_TRUE", "test1") }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] error: usage of an `unsafe` block [INFO] [stderr] --> src/./ci_test.rs:108:5 [INFO] [stderr] | [INFO] [stderr] 108 | unsafe { env::set_var("VALIDATE_NOT_EQUAL_SAME", "test") }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] error: usage of an `unsafe` block [INFO] [stderr] --> src/./ci_test.rs:128:5 [INFO] [stderr] | [INFO] [stderr] 128 | unsafe { env::set_var("VALIDATE_CONTAINS_TRUE", "start test end") }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] error: usage of an `unsafe` block [INFO] [stderr] --> src/./ci_test.rs:139:5 [INFO] [stderr] | [INFO] [stderr] 139 | unsafe { env::set_var("VALIDATE_CONTAINS_FALSE", "start end") }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] error: usage of an `unsafe` block [INFO] [stderr] --> src/./ci_test.rs:167:5 [INFO] [stderr] | [INFO] [stderr] 167 | unsafe { env::set_var("VALIDATE_NOT_EMPTY_EMPTY", "") }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] error: usage of an `unsafe` block [INFO] [stderr] --> src/./ci_test.rs:175:5 [INFO] [stderr] | [INFO] [stderr] 175 | unsafe { env::set_var("VALIDATE_NOT_EMPTY_NOT_EMPTY", "1") }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] error: aborting due to 13 previous errors; 12 warnings emitted [INFO] [stderr] [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: lint `where_clauses_object_safety` has been removed: converted into hard error, see PR #125380 for more information [INFO] [stdout] --> src/lib.rs:159:5 [INFO] [stdout] | [INFO] [stdout] 159 | where_clauses_object_safety, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `box_pointers` has been removed: it does not detect other kinds of allocations, and existed only for historical reasons [INFO] [stdout] --> src/lib.rs:165:5 [INFO] [stdout] | [INFO] [stdout] 165 | box_pointers, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to deprecated safe function `std::env::set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | env::set_var("VALIDATE_EXISTS_TRUE", ""); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #27970 [INFO] [stdout] = note: `--force-warn deprecated-safe-2024` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: you can wrap the call in an `unsafe` block if you can guarantee that the environment access only happens in single-threaded code [INFO] [stdout] | [INFO] [stdout] 7 + // TODO: Audit that the environment access only happens in single-threaded code. [INFO] [stdout] 8 ~ unsafe { env::set_var("VALIDATE_EXISTS_TRUE", "") }; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to deprecated safe function `std::env::set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:20:5 [INFO] [stdout] | [INFO] [stdout] 20 | env::set_var("VALIDATE_ALL_EXISTS_TRUE1", ""); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #27970 [INFO] [stdout] help: you can wrap the call in an `unsafe` block if you can guarantee that the environment access only happens in single-threaded code [INFO] [stdout] | [INFO] [stdout] 20 + // TODO: Audit that the environment access only happens in single-threaded code. [INFO] [stdout] 21 ~ unsafe { env::set_var("VALIDATE_ALL_EXISTS_TRUE1", "") }; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to deprecated safe function `std::env::set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:21:5 [INFO] [stdout] | [INFO] [stdout] 21 | env::set_var("VALIDATE_ALL_EXISTS_TRUE2", ""); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #27970 [INFO] [stdout] help: you can wrap the call in an `unsafe` block if you can guarantee that the environment access only happens in single-threaded code [INFO] [stdout] | [INFO] [stdout] 21 + // TODO: Audit that the environment access only happens in single-threaded code. [INFO] [stdout] 22 ~ unsafe { env::set_var("VALIDATE_ALL_EXISTS_TRUE2", "") }; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to deprecated safe function `std::env::set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:31:5 [INFO] [stdout] | [INFO] [stdout] 31 | env::set_var("VALIDATE_ALL_EXISTS_FALSE1", ""); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #27970 [INFO] [stdout] help: you can wrap the call in an `unsafe` block if you can guarantee that the environment access only happens in single-threaded code [INFO] [stdout] | [INFO] [stdout] 31 + // TODO: Audit that the environment access only happens in single-threaded code. [INFO] [stdout] 32 ~ unsafe { env::set_var("VALIDATE_ALL_EXISTS_FALSE1", "") }; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to deprecated safe function `std::env::set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:41:5 [INFO] [stdout] | [INFO] [stdout] 41 | env::set_var("VALIDATE_ANY_EXISTS_TRUE2", ""); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #27970 [INFO] [stdout] help: you can wrap the call in an `unsafe` block if you can guarantee that the environment access only happens in single-threaded code [INFO] [stdout] | [INFO] [stdout] 41 + // TODO: Audit that the environment access only happens in single-threaded code. [INFO] [stdout] 42 ~ unsafe { env::set_var("VALIDATE_ANY_EXISTS_TRUE2", "") }; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to deprecated safe function `std::env::set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:60:5 [INFO] [stdout] | [INFO] [stdout] 60 | env::set_var("VALIDATE_VALUE_TRUE", "test"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #27970 [INFO] [stdout] help: you can wrap the call in an `unsafe` block if you can guarantee that the environment access only happens in single-threaded code [INFO] [stdout] | [INFO] [stdout] 60 + // TODO: Audit that the environment access only happens in single-threaded code. [INFO] [stdout] 61 ~ unsafe { env::set_var("VALIDATE_VALUE_TRUE", "test") }; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to deprecated safe function `std::env::set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:70:5 [INFO] [stdout] | [INFO] [stdout] 70 | env::set_var("VALIDATE_VALUE_DIFFERENT", "test1"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #27970 [INFO] [stdout] help: you can wrap the call in an `unsafe` block if you can guarantee that the environment access only happens in single-threaded code [INFO] [stdout] | [INFO] [stdout] 70 + // TODO: Audit that the environment access only happens in single-threaded code. [INFO] [stdout] 71 ~ unsafe { env::set_var("VALIDATE_VALUE_DIFFERENT", "test1") }; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to deprecated safe function `std::env::set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:89:5 [INFO] [stdout] | [INFO] [stdout] 89 | env::set_var("VALIDATE_NOT_EQUAL_TRUE", "test1"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #27970 [INFO] [stdout] help: you can wrap the call in an `unsafe` block if you can guarantee that the environment access only happens in single-threaded code [INFO] [stdout] | [INFO] [stdout] 89 + // TODO: Audit that the environment access only happens in single-threaded code. [INFO] [stdout] 90 ~ unsafe { env::set_var("VALIDATE_NOT_EQUAL_TRUE", "test1") }; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to deprecated safe function `std::env::set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:99:5 [INFO] [stdout] | [INFO] [stdout] 99 | env::set_var("VALIDATE_NOT_EQUAL_SAME", "test"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #27970 [INFO] [stdout] help: you can wrap the call in an `unsafe` block if you can guarantee that the environment access only happens in single-threaded code [INFO] [stdout] | [INFO] [stdout] 99 + // TODO: Audit that the environment access only happens in single-threaded code. [INFO] [stdout] 100~ unsafe { env::set_var("VALIDATE_NOT_EQUAL_SAME", "test") }; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to deprecated safe function `std::env::set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:118:5 [INFO] [stdout] | [INFO] [stdout] 118 | env::set_var("VALIDATE_CONTAINS_TRUE", "start test end"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #27970 [INFO] [stdout] help: you can wrap the call in an `unsafe` block if you can guarantee that the environment access only happens in single-threaded code [INFO] [stdout] | [INFO] [stdout] 118 + // TODO: Audit that the environment access only happens in single-threaded code. [INFO] [stdout] 119 ~ unsafe { env::set_var("VALIDATE_CONTAINS_TRUE", "start test end") }; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to deprecated safe function `std::env::set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:128:5 [INFO] [stdout] | [INFO] [stdout] 128 | env::set_var("VALIDATE_CONTAINS_FALSE", "start end"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #27970 [INFO] [stdout] help: you can wrap the call in an `unsafe` block if you can guarantee that the environment access only happens in single-threaded code [INFO] [stdout] | [INFO] [stdout] 128 + // TODO: Audit that the environment access only happens in single-threaded code. [INFO] [stdout] 129 ~ unsafe { env::set_var("VALIDATE_CONTAINS_FALSE", "start end") }; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to deprecated safe function `std::env::set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:155:5 [INFO] [stdout] | [INFO] [stdout] 155 | env::set_var("VALIDATE_NOT_EMPTY_EMPTY", ""); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #27970 [INFO] [stdout] help: you can wrap the call in an `unsafe` block if you can guarantee that the environment access only happens in single-threaded code [INFO] [stdout] | [INFO] [stdout] 155 + // TODO: Audit that the environment access only happens in single-threaded code. [INFO] [stdout] 156 ~ unsafe { env::set_var("VALIDATE_NOT_EMPTY_EMPTY", "") }; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to deprecated safe function `std::env::set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:162:5 [INFO] [stdout] | [INFO] [stdout] 162 | env::set_var("VALIDATE_NOT_EMPTY_NOT_EMPTY", "1"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #27970 [INFO] [stdout] help: you can wrap the call in an `unsafe` block if you can guarantee that the environment access only happens in single-threaded code [INFO] [stdout] | [INFO] [stdout] 162 + // TODO: Audit that the environment access only happens in single-threaded code. [INFO] [stdout] 163 ~ unsafe { env::set_var("VALIDATE_NOT_EMPTY_NOT_EMPTY", "1") }; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 25 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Migrating examples/get.rs from 2021 edition to 2024 [INFO] [stderr] Migrating examples/mock.rs from 2021 edition to 2024 [INFO] [stderr] Migrating tests/get_test.rs from 2021 edition to 2024 [INFO] [stderr] Migrating benches/bench_is_ci.rs from 2021 edition to 2024 [INFO] [stderr] Migrating tests/is_ci_test.rs from 2021 edition to 2024 [INFO] [stderr] Migrating tests/mock_ci_test.rs from 2021 edition to 2024 [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 2.16s [INFO] [stderr] Running `cargo check` to verify 2024 [INFO] [stderr] Checking ci_info v0.14.14 (/tmp/fixit) [INFO] [stdout] warning: lint `byte_slice_in_packed_struct_with_derive` has been removed: converted into hard error, see issue #107457 for more information [INFO] [stdout] --> src/lib.rs:12:5 [INFO] [stdout] | [INFO] [stdout] 12 | byte_slice_in_packed_struct_with_derive, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(renamed_and_removed_lints)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `illegal_floating_point_literal_pattern` has been removed: no longer a warning, float patterns behave the same as `==` [INFO] [stdout] --> src/lib.rs:43:5 [INFO] [stdout] | [INFO] [stdout] 43 | illegal_floating_point_literal_pattern, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `implied_bounds_entailment` has been removed: converted into hard error, see PR #117984 for more information [INFO] [stdout] --> src/lib.rs:44:5 [INFO] [stdout] | [INFO] [stdout] 44 | implied_bounds_entailment, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `indirect_structural_match` has been removed: converted into hard error, see RFC #3535 for more information [INFO] [stdout] --> src/lib.rs:49:5 [INFO] [stdout] | [INFO] [stdout] 49 | indirect_structural_match, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `invalid_alignment` has been removed: converted into hard error, see PR #104616 for more information [INFO] [stdout] --> src/lib.rs:52:5 [INFO] [stdout] | [INFO] [stdout] 52 | invalid_alignment, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `nontrivial_structural_match` has been removed: no longer needed, see RFC #3535 for more information [INFO] [stdout] --> src/lib.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | nontrivial_structural_match, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `pointer_structural_match` has been removed: converted into hard error, see RFC #3535 for more information [INFO] [stdout] --> src/lib.rs:92:5 [INFO] [stdout] | [INFO] [stdout] 92 | pointer_structural_match, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `private_in_public` has been removed: replaced with another group of lints, see RFC for more information [INFO] [stdout] --> src/lib.rs:93:5 [INFO] [stdout] | [INFO] [stdout] 93 | private_in_public, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unknown lint: `proc_macro_back_compat` [INFO] [stdout] --> src/lib.rs:94:5 [INFO] [stdout] | [INFO] [stdout] 94 | proc_macro_back_compat, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unknown_lints)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `suspicious_auto_trait_impls` has been removed: no longer needed, see issue #93367 for more information [INFO] [stdout] --> src/lib.rs:107:5 [INFO] [stdout] | [INFO] [stdout] 107 | suspicious_auto_trait_impls, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `where_clauses_object_safety` has been removed: converted into hard error, see PR #125380 for more information [INFO] [stdout] --> src/lib.rs:159:5 [INFO] [stdout] | [INFO] [stdout] 159 | where_clauses_object_safety, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `box_pointers` has been removed: it does not detect other kinds of allocations, and existed only for historical reasons [INFO] [stdout] --> src/lib.rs:165:5 [INFO] [stdout] | [INFO] [stdout] 165 | box_pointers, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `byte_slice_in_packed_struct_with_derive` has been removed: converted into hard error, see issue #107457 for more information [INFO] [stdout] --> src/lib.rs:12:5 [INFO] [stdout] | [INFO] [stdout] 12 | byte_slice_in_packed_struct_with_derive, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(renamed_and_removed_lints)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `illegal_floating_point_literal_pattern` has been removed: no longer a warning, float patterns behave the same as `==` [INFO] [stdout] --> src/lib.rs:43:5 [INFO] [stdout] | [INFO] [stdout] 43 | illegal_floating_point_literal_pattern, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `implied_bounds_entailment` has been removed: converted into hard error, see PR #117984 for more information [INFO] [stdout] --> src/lib.rs:44:5 [INFO] [stdout] | [INFO] [stdout] 44 | implied_bounds_entailment, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `indirect_structural_match` has been removed: converted into hard error, see RFC #3535 for more information [INFO] [stdout] --> src/lib.rs:49:5 [INFO] [stdout] | [INFO] [stdout] 49 | indirect_structural_match, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `invalid_alignment` has been removed: converted into hard error, see PR #104616 for more information [INFO] [stdout] --> src/lib.rs:52:5 [INFO] [stdout] | [INFO] [stdout] 52 | invalid_alignment, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `nontrivial_structural_match` has been removed: no longer needed, see RFC #3535 for more information [INFO] [stdout] --> src/lib.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | nontrivial_structural_match, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `pointer_structural_match` has been removed: converted into hard error, see RFC #3535 for more information [INFO] [stdout] --> src/lib.rs:92:5 [INFO] [stdout] | [INFO] [stdout] 92 | pointer_structural_match, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `private_in_public` has been removed: replaced with another group of lints, see RFC for more information [INFO] [stdout] --> src/lib.rs:93:5 [INFO] [stdout] | [INFO] [stdout] 93 | private_in_public, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unknown lint: `proc_macro_back_compat` [INFO] [stdout] --> src/lib.rs:94:5 [INFO] [stdout] | [INFO] [stdout] 94 | proc_macro_back_compat, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unknown_lints)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `suspicious_auto_trait_impls` has been removed: no longer needed, see issue #93367 for more information [INFO] [stdout] --> src/lib.rs:107:5 [INFO] [stdout] | [INFO] [stdout] 107 | suspicious_auto_trait_impls, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `where_clauses_object_safety` has been removed: converted into hard error, see PR #125380 for more information [INFO] [stdout] --> src/lib.rs:159:5 [INFO] [stdout] | [INFO] [stdout] 159 | where_clauses_object_safety, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `box_pointers` has been removed: it does not detect other kinds of allocations, and existed only for historical reasons [INFO] [stdout] --> src/lib.rs:165:5 [INFO] [stdout] | [INFO] [stdout] 165 | box_pointers, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 12 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0133]: call to unsafe function `set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | env::set_var("VALIDATE_EXISTS_TRUE", ""); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0133]: call to unsafe function `set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:20:5 [INFO] [stdout] | [INFO] [stdout] 20 | env::set_var("VALIDATE_ALL_EXISTS_TRUE1", ""); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0133]: call to unsafe function `set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:21:5 [INFO] [stdout] | [INFO] [stdout] 21 | env::set_var("VALIDATE_ALL_EXISTS_TRUE2", ""); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0133]: call to unsafe function `set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:31:5 [INFO] [stdout] | [INFO] [stdout] 31 | env::set_var("VALIDATE_ALL_EXISTS_FALSE1", ""); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0133]: call to unsafe function `set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:41:5 [INFO] [stdout] | [INFO] [stdout] 41 | env::set_var("VALIDATE_ANY_EXISTS_TRUE2", ""); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0133]: call to unsafe function `set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:60:5 [INFO] [stdout] | [INFO] [stdout] 60 | env::set_var("VALIDATE_VALUE_TRUE", "test"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0133]: call to unsafe function `set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:70:5 [INFO] [stdout] | [INFO] [stdout] 70 | env::set_var("VALIDATE_VALUE_DIFFERENT", "test1"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0133]: call to unsafe function `set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:89:5 [INFO] [stdout] | [INFO] [stdout] 89 | env::set_var("VALIDATE_NOT_EQUAL_TRUE", "test1"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0133]: call to unsafe function `set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:99:5 [INFO] [stdout] | [INFO] [stdout] 99 | env::set_var("VALIDATE_NOT_EQUAL_SAME", "test"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0133]: call to unsafe function `set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:118:5 [INFO] [stdout] | [INFO] [stdout] 118 | env::set_var("VALIDATE_CONTAINS_TRUE", "start test end"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0133]: call to unsafe function `set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:128:5 [INFO] [stdout] | [INFO] [stdout] 128 | env::set_var("VALIDATE_CONTAINS_FALSE", "start end"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0133]: call to unsafe function `set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:155:5 [INFO] [stdout] | [INFO] [stdout] 155 | env::set_var("VALIDATE_NOT_EMPTY_EMPTY", ""); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0133]: call to unsafe function `set_var` is unsafe and requires unsafe block [INFO] [stdout] --> src/./ci_test.rs:162:5 [INFO] [stdout] | [INFO] [stdout] 162 | env::set_var("VALIDATE_NOT_EMPTY_NOT_EMPTY", "1"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 13 previous errors; 12 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] error: could not compile `ci_info` (lib test) due to 14 previous errors; 12 warnings emitted [INFO] [stderr] error: failed to check after updating to 2024 [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] process didn't exit successfully: `cargo check --frozen --all --all-targets --message-format=json` (exit status: 101) [INFO] running `Command { std: "docker" "inspect" "d5ee5954483b3dfb8d8375b1a8383de8c81b601d13691f24f66f9751c3e99446", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "d5ee5954483b3dfb8d8375b1a8383de8c81b601d13691f24f66f9751c3e99446", kill_on_drop: false }` [INFO] [stdout] d5ee5954483b3dfb8d8375b1a8383de8c81b601d13691f24f66f9751c3e99446