[INFO] fetching crate multiversx-sdk 0.9.1... [INFO] checking multiversx-sdk-0.9.1 against try#306c6aded24f02440063be828ebe601fe5eb8323 for pr-133502-3 [INFO] extracting crate multiversx-sdk 0.9.1 into /workspace/builds/worker-3-tc2/source [INFO] validating manifest of crates.io crate multiversx-sdk 0.9.1 on toolchain 306c6aded24f02440063be828ebe601fe5eb8323 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+306c6aded24f02440063be828ebe601fe5eb8323" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate multiversx-sdk 0.9.1 [INFO] removed 0 missing examples [INFO] removed 0 missing tests [INFO] finished tweaking crates.io crate multiversx-sdk 0.9.1 [INFO] tweaked toml for crates.io crate multiversx-sdk 0.9.1 written to /workspace/builds/worker-3-tc2/source/Cargo.toml [INFO] crate crates.io crate multiversx-sdk 0.9.1 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+306c6aded24f02440063be828ebe601fe5eb8323" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:b0b074c097205a61b89e8ad263052f976b2b332c4dc5f02aef1fe52501660d6e" "/opt/rustwide/cargo-home/bin/cargo" "+306c6aded24f02440063be828ebe601fe5eb8323" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 336e50203667d2110714d92738d7846d69b10c7ab5e01fece68332ade0ef5bff [INFO] running `Command { std: "docker" "start" "-a" "336e50203667d2110714d92738d7846d69b10c7ab5e01fece68332ade0ef5bff", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "336e50203667d2110714d92738d7846d69b10c7ab5e01fece68332ade0ef5bff", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "336e50203667d2110714d92738d7846d69b10c7ab5e01fece68332ade0ef5bff", kill_on_drop: false }` [INFO] [stdout] 336e50203667d2110714d92738d7846d69b10c7ab5e01fece68332ade0ef5bff [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:b0b074c097205a61b89e8ad263052f976b2b332c4dc5f02aef1fe52501660d6e" "/opt/rustwide/cargo-home/bin/cargo" "+306c6aded24f02440063be828ebe601fe5eb8323" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 50a763865405264e31fd0b3c3de80276ddedf57f0e20288262fe01764f6e1518 [INFO] running `Command { std: "docker" "start" "-a" "50a763865405264e31fd0b3c3de80276ddedf57f0e20288262fe01764f6e1518", kill_on_drop: false }` [INFO] [stderr] Compiling libc v0.2.170 [INFO] [stderr] Compiling zerocopy v0.8.23 [INFO] [stderr] Compiling bitcoin-internals v0.2.0 [INFO] [stderr] Compiling hex v0.4.3 [INFO] [stderr] Compiling getrandom v0.3.1 [INFO] [stderr] Compiling serde_json v1.0.140 [INFO] [stderr] Checking arrayvec v0.7.6 [INFO] [stderr] Checking hex-conservative v0.1.2 [INFO] [stderr] Checking base64ct v1.7.1 [INFO] [stderr] Checking unwrap-infallible v0.1.5 [INFO] [stderr] Checking hashbrown v0.15.2 [INFO] [stderr] Checking equivalent v1.0.2 [INFO] [stderr] Checking unicode-normalization v0.1.22 [INFO] [stderr] Compiling quote v1.0.39 [INFO] [stderr] Compiling anyhow v1.0.97 [INFO] [stderr] Checking crypto-common v0.1.6 [INFO] [stderr] Checking inout v0.1.4 [INFO] [stderr] Checking base64 v0.22.1 [INFO] [stderr] Checking either v1.15.0 [INFO] [stderr] Checking keccak v0.1.5 [INFO] [stderr] Checking digest v0.10.7 [INFO] [stderr] Checking cipher v0.4.4 [INFO] [stderr] Compiling syn v2.0.100 [INFO] [stderr] Checking bech32 v0.11.0 [INFO] [stderr] Checking zeroize v1.8.1 [INFO] [stderr] Checking bitcoin_hashes v0.13.0 [INFO] [stderr] Checking itertools v0.14.0 [INFO] [stderr] Checking hmac v0.12.1 [INFO] [stderr] Checking sha2 v0.10.8 [INFO] [stderr] Checking salsa20 v0.10.2 [INFO] [stderr] Checking ctr v0.9.2 [INFO] [stderr] Checking aes v0.8.4 [INFO] [stderr] Checking pbkdf2 v0.12.2 [INFO] [stderr] Checking pem v3.0.5 [INFO] [stderr] Checking getrandom v0.2.15 [INFO] [stderr] Checking indexmap v2.8.0 [INFO] [stderr] Checking rand_core v0.6.4 [INFO] [stderr] Checking sha3 v0.10.8 [INFO] [stderr] Checking uuid v1.15.1 [INFO] [stderr] Checking password-hash v0.5.0 [INFO] [stderr] Checking scrypt v0.11.0 [INFO] [stderr] Checking ppv-lite86 v0.2.21 [INFO] [stderr] Checking rand_chacha v0.3.1 [INFO] [stderr] Checking rand v0.8.5 [INFO] [stderr] Compiling serde_derive v1.0.219 [INFO] [stderr] Compiling multiversx-sc-codec-derive v0.22.0 [INFO] [stderr] Compiling serde_repr v0.1.20 [INFO] [stderr] Checking multiversx-sc-codec v0.22.0 [INFO] [stderr] Checking serde v1.0.219 [INFO] [stderr] Checking multiversx-chain-core v0.14.0 [INFO] [stderr] Checking bip39 v2.1.0 [INFO] [stderr] Checking multiversx-sdk v0.9.1 (/opt/rustwide/workdir) [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: KeyIvInit` [INFO] [stdout] --> src/wallet.rs:292:26 [INFO] [stdout] | [INFO] [stdout] 292 | let mut cipher = Ctr128BE::::new( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as KeySizeUser>::KeySize` [INFO] [stdout] --> src/wallet.rs:293:13 [INFO] [stdout] | [INFO] [stdout] 293 | decryption_params.derived_key_first_half.as_slice().into(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as IvSizeUser>::IvSize` [INFO] [stdout] --> src/wallet.rs:294:13 [INFO] [stdout] | [INFO] [stdout] 294 | decryption_params.iv.as_slice().into(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> src/wallet.rs:297:16 [INFO] [stdout] | [INFO] [stdout] 297 | cipher.apply_keystream(&mut decrypted); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> src/wallet.rs:292:26 [INFO] [stdout] | [INFO] [stdout] 292 | let mut cipher = Ctr128BE::::new( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> src/wallet.rs:292:26 [INFO] [stdout] | [INFO] [stdout] 292 | let mut cipher = Ctr128BE::::new( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&GenericArray> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> src/wallet.rs:293:13 [INFO] [stdout] | [INFO] [stdout] 293 | decryption_params.derived_key_first_half.as_slice().into(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&GenericArray> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> src/wallet.rs:294:13 [INFO] [stdout] | [INFO] [stdout] 294 | decryption_params.iv.as_slice().into(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> src/wallet.rs:292:26 [INFO] [stdout] | [INFO] [stdout] 292 | let mut cipher = Ctr128BE::::new( [INFO] [stdout] | __________________________^ [INFO] [stdout] 293 | | decryption_params.derived_key_first_half.as_slice().into(), [INFO] [stdout] 294 | | decryption_params.iv.as_slice().into(), [INFO] [stdout] 295 | | ); [INFO] [stdout] | |_________^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> src/wallet.rs:297:9 [INFO] [stdout] | [INFO] [stdout] 297 | cipher.apply_keystream(&mut decrypted); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> src/wallet.rs:297:16 [INFO] [stdout] | [INFO] [stdout] 297 | cipher.apply_keystream(&mut decrypted); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: KeyIvInit` [INFO] [stdout] --> src/wallet.rs:292:26 [INFO] [stdout] | [INFO] [stdout] 292 | let mut cipher = Ctr128BE::::new( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as KeySizeUser>::KeySize` [INFO] [stdout] --> src/wallet.rs:293:13 [INFO] [stdout] | [INFO] [stdout] 293 | decryption_params.derived_key_first_half.as_slice().into(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `_ == > as IvSizeUser>::IvSize` [INFO] [stdout] --> src/wallet.rs:294:13 [INFO] [stdout] | [INFO] [stdout] 294 | decryption_params.iv.as_slice().into(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper>: StreamCipher` [INFO] [stdout] --> src/wallet.rs:297:16 [INFO] [stdout] | [INFO] [stdout] 297 | cipher.apply_keystream(&mut decrypted); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> src/wallet.rs:292:26 [INFO] [stdout] | [INFO] [stdout] 292 | let mut cipher = Ctr128BE::::new( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> src/wallet.rs:292:26 [INFO] [stdout] | [INFO] [stdout] 292 | let mut cipher = Ctr128BE::::new( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&GenericArray> as KeySizeUser>::KeySize> well-formed` [INFO] [stdout] --> src/wallet.rs:293:13 [INFO] [stdout] | [INFO] [stdout] 293 | decryption_params.derived_key_first_half.as_slice().into(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `&GenericArray> as IvSizeUser>::IvSize> well-formed` [INFO] [stdout] --> src/wallet.rs:294:13 [INFO] [stdout] | [INFO] [stdout] 294 | decryption_params.iv.as_slice().into(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> src/wallet.rs:292:26 [INFO] [stdout] | [INFO] [stdout] 292 | let mut cipher = Ctr128BE::::new( [INFO] [stdout] | __________________________^ [INFO] [stdout] 293 | | decryption_params.derived_key_first_half.as_slice().into(), [INFO] [stdout] 294 | | decryption_params.iv.as_slice().into(), [INFO] [stdout] 295 | | ); [INFO] [stdout] | |_________^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `StreamCipherCoreWrapper> well-formed` [INFO] [stdout] --> src/wallet.rs:297:9 [INFO] [stdout] | [INFO] [stdout] 297 | cipher.apply_keystream(&mut decrypted); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0275]: overflow evaluating the requirement `fn(&mut StreamCipherCoreWrapper>, &mut [u8]) well-formed` [INFO] [stdout] --> src/wallet.rs:297:16 [INFO] [stdout] | [INFO] [stdout] 297 | cipher.apply_keystream(&mut decrypted); [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider increasing the recursion limit by adding a `#![recursion_limit = "256"]` attribute to your crate (`multiversx_sdk`) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0275`. [INFO] [stdout] [INFO] [stderr] error: could not compile `multiversx-sdk` (lib) due to 11 previous errors [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stdout] For more information about this error, try `rustc --explain E0275`. [INFO] [stdout] [INFO] [stderr] error: could not compile `multiversx-sdk` (lib test) due to 11 previous errors [INFO] running `Command { std: "docker" "inspect" "50a763865405264e31fd0b3c3de80276ddedf57f0e20288262fe01764f6e1518", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "50a763865405264e31fd0b3c3de80276ddedf57f0e20288262fe01764f6e1518", kill_on_drop: false }` [INFO] [stdout] 50a763865405264e31fd0b3c3de80276ddedf57f0e20288262fe01764f6e1518