[INFO] fetching crate privacypass 0.2.0-pre.0...
[INFO] checking privacypass-0.2.0-pre.0 against try#31561a63598a0f21fc74c024747ef1310fdd2eb2 for pr-133536
[INFO] extracting crate privacypass 0.2.0-pre.0 into /workspace/builds/worker-2-tc2/source
[INFO] validating manifest of crates.io crate privacypass 0.2.0-pre.0 on toolchain 31561a63598a0f21fc74c024747ef1310fdd2eb2
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+31561a63598a0f21fc74c024747ef1310fdd2eb2" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking crates.io crate privacypass 0.2.0-pre.0
[INFO] finished tweaking crates.io crate privacypass 0.2.0-pre.0
[INFO] tweaked toml for crates.io crate privacypass 0.2.0-pre.0 written to /workspace/builds/worker-2-tc2/source/Cargo.toml
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+31561a63598a0f21fc74c024747ef1310fdd2eb2" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Updating crates.io index
[INFO] [stderr]      Locking 170 packages to latest compatible versions
[INFO] [stderr]       Adding generic-array v0.14.7 (available: v1.1.1)
[INFO] [stderr]       Adding thiserror v1.0.69 (available: v2.0.3)
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+31561a63598a0f21fc74c024747ef1310fdd2eb2" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4a844ea9eb2546a2d2c7022eacef16ef2e8229c7fbb2c7d4d55a9ceca922f72d" "/opt/rustwide/cargo-home/bin/cargo" "+31561a63598a0f21fc74c024747ef1310fdd2eb2" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 438257f5a766965f7f98d4603c954eb00ff3a3fd0fbf932b0d9f693eab2a5b66
[INFO] running `Command { std: "docker" "start" "-a" "438257f5a766965f7f98d4603c954eb00ff3a3fd0fbf932b0d9f693eab2a5b66", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "438257f5a766965f7f98d4603c954eb00ff3a3fd0fbf932b0d9f693eab2a5b66", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "438257f5a766965f7f98d4603c954eb00ff3a3fd0fbf932b0d9f693eab2a5b66", kill_on_drop: false }`
[INFO] [stdout] 438257f5a766965f7f98d4603c954eb00ff3a3fd0fbf932b0d9f693eab2a5b66
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4a844ea9eb2546a2d2c7022eacef16ef2e8229c7fbb2c7d4d55a9ceca922f72d" "/opt/rustwide/cargo-home/bin/cargo" "+31561a63598a0f21fc74c024747ef1310fdd2eb2" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] cbf02047e0d6c5d4bce42802b8979b0cc8659c218af20c52cf97487222869c94
[INFO] running `Command { std: "docker" "start" "-a" "cbf02047e0d6c5d4bce42802b8979b0cc8659c218af20c52cf97487222869c94", kill_on_drop: false }`
[INFO] [stderr]     Checking subtle v2.6.1
[INFO] [stderr]     Checking base64ct v1.6.0
[INFO] [stderr]    Compiling generic-array v0.14.7
[INFO] [stderr]    Compiling num-traits v0.2.19
[INFO] [stderr]     Checking base16ct v0.2.0
[INFO] [stderr]    Compiling num-bigint-dig v0.8.4
[INFO] [stderr]    Compiling syn v2.0.90
[INFO] [stderr]    Compiling curve25519-dalek v4.1.3
[INFO] [stderr]     Checking lazy_static v1.5.0
[INFO] [stderr]     Checking futures-util v0.3.31
[INFO] [stderr]     Checking parking_lot_core v0.9.10
[INFO] [stderr]     Checking plotters-backend v0.3.7
[INFO] [stderr]     Checking regex-automata v0.4.9
[INFO] [stderr]    Compiling derive-new v0.5.9
[INFO] [stderr]     Checking nom v7.1.3
[INFO] [stderr]     Checking is-terminal v0.4.13
[INFO] [stderr]     Checking ff v0.13.0
[INFO] [stderr]     Checking parking_lot v0.12.3
[INFO] [stderr]     Checking plotters-svg v0.3.7
[INFO] [stderr]     Checking group v0.13.0
[INFO] [stderr]     Checking pem-rfc7468 v0.6.0
[INFO] [stderr]     Checking num-integer v0.1.46
[INFO] [stderr]     Checking plotters v0.3.7
[INFO] [stderr]     Checking num-iter v0.1.45
[INFO] [stderr]     Checking regex v1.11.1
[INFO] [stderr]     Checking futures-executor v0.3.31
[INFO] [stderr]     Checking futures v0.3.31
[INFO] [stderr]    Compiling zeroize_derive v1.4.2
[INFO] [stderr]    Compiling serde_derive v1.0.215
[INFO] [stderr]    Compiling zerocopy-derive v0.7.35
[INFO] [stderr]    Compiling curve25519-dalek-derive v0.1.1
[INFO] [stderr]    Compiling displaydoc v0.2.5
[INFO] [stderr]    Compiling thiserror-impl v1.0.69
[INFO] [stderr]    Compiling derive_more v0.99.18
[INFO] [stderr]    Compiling derive-where v1.2.7
[INFO] [stderr]    Compiling tokio-macros v2.4.0
[INFO] [stderr]    Compiling tls_codec_derive v0.4.1
[INFO] [stderr]    Compiling async-trait v0.1.83
[INFO] [stderr]     Checking zeroize v1.8.1
[INFO] [stderr]     Checking tokio v1.41.1
[INFO] [stderr]     Checking der v0.7.9
[INFO] [stderr]     Checking der v0.6.1
[INFO] [stderr]     Checking tls_codec v0.4.1
[INFO] [stderr]     Checking zerocopy v0.7.35
[INFO] [stderr]     Checking thiserror v1.0.69
[INFO] [stderr]     Checking ppv-lite86 v0.2.20
[INFO] [stderr]     Checking spki v0.6.0
[INFO] [stderr]     Checking pkcs8 v0.9.0
[INFO] [stderr]     Checking pkcs1 v0.4.1
[INFO] [stderr]     Checking rand_chacha v0.3.1
[INFO] [stderr]     Checking rand v0.8.5
[INFO] [stderr]     Checking serde v1.0.215
[INFO] [stderr]     Checking serde_json v1.0.133
[INFO] [stderr]     Checking ciborium v0.2.2
[INFO] [stderr]     Checking hex v0.4.3
[INFO] [stderr]     Checking block-buffer v0.10.4
[INFO] [stderr]     Checking crypto-common v0.1.6
[INFO] [stderr]     Checking crypto-bigint v0.5.5
[INFO] [stderr]     Checking sec1 v0.7.3
[INFO] [stderr]     Checking digest v0.10.7
[INFO] [stderr]     Checking tinytemplate v1.2.1
[INFO] [stderr]     Checking signature v2.2.0
[INFO] [stderr]     Checking sha2 v0.10.8
[INFO] [stderr]     Checking hmac-sha512 v1.1.5
[INFO] [stderr]     Checking hmac-sha256 v1.1.7
[INFO] [stderr]     Checking rsa v0.8.2
[INFO] [stderr]     Checking criterion v0.5.1
[INFO] [stderr]     Checking blind-rsa-signatures v0.15.1
[INFO] [stderr]     Checking elliptic-curve v0.13.8
[INFO] [stderr]     Checking primeorder v0.13.6
[INFO] [stderr]     Checking voprf v0.5.0
[INFO] [stderr]     Checking p384 v0.13.0
[INFO] [stderr]     Checking privacypass v0.2.0-pre.0 (/opt/rustwide/workdir)
[INFO] [stdout] error[E0432]: unresolved import `voprf::derive_key`
[INFO] [stdout]    --> tests/kat_batched.rs:11:13
[INFO] [stdout]     |
[INFO] [stdout] 11  | use voprf::{derive_key, Group, Mode, Ristretto255};
[INFO] [stdout]     |             ^^^^^^^^^^ no `derive_key` in the root
[INFO] [stdout]     |
[INFO] [stdout] note: found an item that was configured out
[INFO] [stdout]    --> /opt/rustwide/cargo-home/registry/src/index.crates.io-6f17d22bba15001f/voprf-0.5.0/src/lib.rs:573:24
[INFO] [stdout]     |
[INFO] [stdout] 573 | pub use crate::common::derive_key;
[INFO] [stdout]     |                        ^^^^^^^^^^
[INFO] [stdout] note: the item is gated behind the `danger` feature
[INFO] [stdout]    --> /opt/rustwide/cargo-home/registry/src/index.crates.io-6f17d22bba15001f/voprf-0.5.0/src/lib.rs:572:7
[INFO] [stdout]     |
[INFO] [stdout] 572 | #[cfg(feature = "danger")]
[INFO] [stdout]     |       ^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0432]: unresolved import `voprf::derive_key`
[INFO] [stdout]    --> tests/kat_private.rs:12:13
[INFO] [stdout]     |
[INFO] [stdout] 12  | use voprf::{derive_key, Group, Mode};
[INFO] [stdout]     |             ^^^^^^^^^^ no `derive_key` in the root
[INFO] [stdout]     |
[INFO] [stdout] note: found an item that was configured out
[INFO] [stdout]    --> /opt/rustwide/cargo-home/registry/src/index.crates.io-6f17d22bba15001f/voprf-0.5.0/src/lib.rs:573:24
[INFO] [stdout]     |
[INFO] [stdout] 573 | pub use crate::common::derive_key;
[INFO] [stdout]     |                        ^^^^^^^^^^
[INFO] [stdout] note: the item is gated behind the `danger` feature
[INFO] [stdout]    --> /opt/rustwide/cargo-home/registry/src/index.crates.io-6f17d22bba15001f/voprf-0.5.0/src/lib.rs:572:7
[INFO] [stdout]     |
[INFO] [stdout] 572 | #[cfg(feature = "danger")]
[INFO] [stdout]     |       ^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0599]: no method named `set_key` found for struct `privacypass::batched_tokens::server::Server` in the current scope
[INFO] [stdout]   --> tests/kat_batched.rs:75:33
[INFO] [stdout]    |
[INFO] [stdout] 75 |         let public_key = server.set_key(&key_store, &vector.sk_s).await.unwrap();
[INFO] [stdout]    |                                 ^^^^^^^ method not found in `Server`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0599]: no method named `set_keypair` found for struct `privacypass::public_tokens::server::IssuerServer` in the current scope
[INFO] [stdout]   --> tests/kat_public.rs:79:23
[INFO] [stdout]    |
[INFO] [stdout] 79 |         issuer_server.set_keypair(&issuer_key_store, keypair).await;
[INFO] [stdout]    |                       ^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout] help: there is a method `create_keypair` with a similar name
[INFO] [stdout]    |
[INFO] [stdout] 79 |         issuer_server.create_keypair(&issuer_key_store, keypair).await;
[INFO] [stdout]    |                       ~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0599]: no method named `issue_token_request_with_params` found for struct `privacypass::batched_tokens::client::Client` in the current scope
[INFO] [stdout]    --> tests/kat_batched.rs:100:14
[INFO] [stdout]     |
[INFO] [stdout] 99  |           let (token_request, token_states) = client
[INFO] [stdout]     |  _____________________________________________-
[INFO] [stdout] 100 | |             .issue_token_request_with_params(&token_challenge, nonces, blinds)
[INFO] [stdout]     | |_____________-^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout] help: there is a method `issue_token_request` with a similar name, but with different arguments
[INFO] [stdout]    --> /opt/rustwide/workdir/src/batched_tokens/client.rs:64:5
[INFO] [stdout]     |
[INFO] [stdout] 64  | /     pub fn issue_token_request(
[INFO] [stdout] 65  | |         &self,
[INFO] [stdout] 66  | |         challenge: &TokenChallenge,
[INFO] [stdout] 67  | |         nr: u16,
[INFO] [stdout] 68  | |     ) -> Result<(TokenRequest, Vec<TokenState>), IssueTokenRequestError> {
[INFO] [stdout]     | |________________________________________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0599]: no method named `set_key` found for struct `privacypass::private_tokens::server::Server` in the current scope
[INFO] [stdout]   --> tests/kat_private.rs:57:33
[INFO] [stdout]    |
[INFO] [stdout] 57 |         let public_key = server.set_key(&key_store, &vector.sk_s).await.unwrap();
[INFO] [stdout]    |                                 ^^^^^^^ method not found in `Server`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0599]: no method named `set_keypair` found for struct `privacypass::public_tokens::server::IssuerServer` in the current scope
[INFO] [stdout]    --> tests/kat_public.rs:160:14
[INFO] [stdout]     |
[INFO] [stdout] 159 | /         issuer_server
[INFO] [stdout] 160 | |             .set_keypair(&issuer_key_store, keypair.clone())
[INFO] [stdout]     | |_____________-^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout] help: there is a method `create_keypair` with a similar name
[INFO] [stdout]     |
[INFO] [stdout] 160 |             .create_keypair(&issuer_key_store, keypair.clone())
[INFO] [stdout]     |              ~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0599]: no method named `issue_token_request_with_params` found for struct `privacypass::private_tokens::client::Client` in the current scope
[INFO] [stdout]   --> tests/kat_private.rs:74:14
[INFO] [stdout]    |
[INFO] [stdout] 73 |           let (token_request, token_state) = client
[INFO] [stdout]    |  ____________________________________________-
[INFO] [stdout] 74 | |             .issue_token_request_with_params(&token_challenge, nonce, blind)
[INFO] [stdout]    | |_____________-^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout] help: there is a method `issue_token_request` with a similar name, but with different arguments
[INFO] [stdout]   --> /opt/rustwide/workdir/src/private_tokens/client.rs:65:5
[INFO] [stdout]    |
[INFO] [stdout] 65 | /     pub fn issue_token_request(
[INFO] [stdout] 66 | |         &self,
[INFO] [stdout] 67 | |         challenge: &TokenChallenge,
[INFO] [stdout] 68 | |     ) -> Result<(TokenRequest, TokenState), IssueTokenRequestError> {
[INFO] [stdout]    | |___________________________________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0599]: no method named `create_keypair_with_params` found for struct `privacypass::batched_tokens::server::Server` in the current scope
[INFO] [stdout]    --> tests/kat_batched.rs:160:14
[INFO] [stdout]     |
[INFO] [stdout] 159 |           let public_key = server
[INFO] [stdout]     |  __________________________-
[INFO] [stdout] 160 | |             .create_keypair_with_params(&key_store, &seed, info)
[INFO] [stdout]     | |_____________-^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout] help: there is a method `create_keypair` with a similar name, but with different arguments
[INFO] [stdout]    --> /opt/rustwide/workdir/src/batched_tokens/server.rs:94:5
[INFO] [stdout]     |
[INFO] [stdout] 94  | /     pub async fn create_keypair<BKS: BatchedKeyStore>(
[INFO] [stdout] 95  | |         &self,
[INFO] [stdout] 96  | |         key_store: &BKS,
[INFO] [stdout] 97  | |     ) -> Result<PublicKey, CreateKeypairError> {
[INFO] [stdout]     | |______________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0599]: no method named `issue_token_request_with_params` found for struct `privacypass::batched_tokens::client::Client` in the current scope
[INFO] [stdout]    --> tests/kat_batched.rs:218:14
[INFO] [stdout]     |
[INFO] [stdout] 217 |           let (kat_token_request, token_states) = client
[INFO] [stdout]     |  _________________________________________________-
[INFO] [stdout] 218 | |             .issue_token_request_with_params(&kat_token_challenge, kat_nonces, kat_blinds)
[INFO] [stdout]     | |_____________-^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout] help: there is a method `issue_token_request` with a similar name, but with different arguments
[INFO] [stdout]    --> /opt/rustwide/workdir/src/batched_tokens/client.rs:64:5
[INFO] [stdout]     |
[INFO] [stdout] 64  | /     pub fn issue_token_request(
[INFO] [stdout] 65  | |         &self,
[INFO] [stdout] 66  | |         challenge: &TokenChallenge,
[INFO] [stdout] 67  | |         nr: u16,
[INFO] [stdout] 68  | |     ) -> Result<(TokenRequest, Vec<TokenState>), IssueTokenRequestError> {
[INFO] [stdout]     | |________________________________________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0599`.
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `privacypass` (test "kat_public") due to 2 previous errors
[INFO] [stderr] warning: build failed, waiting for other jobs to finish...
[INFO] [stdout] error[E0599]: no method named `create_keypair_with_params` found for struct `privacypass::private_tokens::server::Server` in the current scope
[INFO] [stdout]    --> tests/kat_private.rs:131:14
[INFO] [stdout]     |
[INFO] [stdout] 130 |           let public_key = server
[INFO] [stdout]     |  __________________________-
[INFO] [stdout] 131 | |             .create_keypair_with_params(&key_store, &seed, info)
[INFO] [stdout]     | |_____________-^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout] help: there is a method `create_keypair` with a similar name, but with different arguments
[INFO] [stdout]    --> /opt/rustwide/workdir/src/private_tokens/server.rs:93:5
[INFO] [stdout]     |
[INFO] [stdout] 93  | /     pub async fn create_keypair<PKS: PrivateKeyStore>(
[INFO] [stdout] 94  | |         &self,
[INFO] [stdout] 95  | |         key_store: &PKS,
[INFO] [stdout] 96  | |     ) -> Result<PublicKey, CreateKeypairError> {
[INFO] [stdout]     | |______________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] Some errors have detailed explanations: E0432, E0599.
[INFO] [stdout] 
[INFO] [stdout] For more information about an error, try `rustc --explain E0432`.
[INFO] [stdout] 
[INFO] [stdout] error[E0599]: no method named `issue_token_request_with_params` found for struct `privacypass::private_tokens::client::Client` in the current scope
[INFO] [stdout]    --> tests/kat_private.rs:175:14
[INFO] [stdout]     |
[INFO] [stdout] 174 |           let (kat_token_request, token_state) = client
[INFO] [stdout]     |  ________________________________________________-
[INFO] [stdout] 175 | |             .issue_token_request_with_params(&kat_token_challenge, kat_nonce, kat_blind)
[INFO] [stdout]     | |_____________-^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout] help: there is a method `issue_token_request` with a similar name, but with different arguments
[INFO] [stdout]    --> /opt/rustwide/workdir/src/private_tokens/client.rs:65:5
[INFO] [stdout]     |
[INFO] [stdout] 65  | /     pub fn issue_token_request(
[INFO] [stdout] 66  | |         &self,
[INFO] [stdout] 67  | |         challenge: &TokenChallenge,
[INFO] [stdout] 68  | |     ) -> Result<(TokenRequest, TokenState), IssueTokenRequestError> {
[INFO] [stdout]     | |___________________________________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `privacypass` (test "kat_batched") due to 5 previous errors
[INFO] [stdout] Some errors have detailed explanations: E0432, E0599.
[INFO] [stdout] 
[INFO] [stdout] For more information about an error, try `rustc --explain E0432`.
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `privacypass` (test "kat_private") due to 5 previous errors
[INFO] running `Command { std: "docker" "inspect" "cbf02047e0d6c5d4bce42802b8979b0cc8659c218af20c52cf97487222869c94", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "cbf02047e0d6c5d4bce42802b8979b0cc8659c218af20c52cf97487222869c94", kill_on_drop: false }`
[INFO] [stdout] cbf02047e0d6c5d4bce42802b8979b0cc8659c218af20c52cf97487222869c94
