[INFO] cloning repository https://github.com/thehackersbrain/hiddenpng [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/thehackersbrain/hiddenpng" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fthehackersbrain%2Fhiddenpng", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fthehackersbrain%2Fhiddenpng'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] e0b79fb04461432820464ce31f98c79d20c52399 [INFO] checking thehackersbrain/hiddenpng against master#69fd5e4059f8840f09f60269bcda23dcdcb77151 for pr-135733 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fthehackersbrain%2Fhiddenpng" "/workspace/builds/worker-5-tc1/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-5-tc1/source'... [INFO] [stderr] done. [INFO] validating manifest of git repo https://github.com/thehackersbrain/hiddenpng on toolchain 69fd5e4059f8840f09f60269bcda23dcdcb77151 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+69fd5e4059f8840f09f60269bcda23dcdcb77151" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking git repo https://github.com/thehackersbrain/hiddenpng [INFO] finished tweaking git repo https://github.com/thehackersbrain/hiddenpng [INFO] tweaked toml for git repo https://github.com/thehackersbrain/hiddenpng written to /workspace/builds/worker-5-tc1/source/Cargo.toml [INFO] crate git repo https://github.com/thehackersbrain/hiddenpng already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+69fd5e4059f8840f09f60269bcda23dcdcb77151" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:3959728d45483eb673ba100a951a6b9f5012970368db2a9e08e0ac9b67c8a5ad" "/opt/rustwide/cargo-home/bin/cargo" "+69fd5e4059f8840f09f60269bcda23dcdcb77151" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 01b573d9ce386cca2bc28b5d14724defe13c3d7434c40b0de276e949831ce509 [INFO] running `Command { std: "docker" "start" "-a" "01b573d9ce386cca2bc28b5d14724defe13c3d7434c40b0de276e949831ce509", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "01b573d9ce386cca2bc28b5d14724defe13c3d7434c40b0de276e949831ce509", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "01b573d9ce386cca2bc28b5d14724defe13c3d7434c40b0de276e949831ce509", kill_on_drop: false }` [INFO] [stdout] 01b573d9ce386cca2bc28b5d14724defe13c3d7434c40b0de276e949831ce509 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:3959728d45483eb673ba100a951a6b9f5012970368db2a9e08e0ac9b67c8a5ad" "/opt/rustwide/cargo-home/bin/cargo" "+69fd5e4059f8840f09f60269bcda23dcdcb77151" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 0bcd1318f5627c5cce3195393ef2ca0fa62707b1e6e25a5f0437e254e4693f8a [INFO] running `Command { std: "docker" "start" "-a" "0bcd1318f5627c5cce3195393ef2ca0fa62707b1e6e25a5f0437e254e4693f8a", kill_on_drop: false }` [INFO] [stderr] Compiling typenum v1.16.0 [INFO] [stderr] Compiling generic-array v0.14.6 [INFO] [stderr] Compiling libc v0.2.139 [INFO] [stderr] Checking ppv-lite86 v0.2.17 [INFO] [stderr] Checking block-padding v0.2.1 [INFO] [stderr] Checking cpufeatures v0.2.5 [INFO] [stderr] Checking opaque-debug v0.3.0 [INFO] [stderr] Checking getrandom v0.2.8 [INFO] [stderr] Checking rand_core v0.6.4 [INFO] [stderr] Checking rand_chacha v0.3.1 [INFO] [stderr] Checking rand v0.8.5 [INFO] [stderr] Checking cipher v0.3.0 [INFO] [stderr] Checking block-padding v0.3.2 [INFO] [stderr] Checking block-modes v0.8.1 [INFO] [stderr] Checking aes v0.7.5 [INFO] [stderr] Checking hiddenpng v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused variable: `original_image_len` [INFO] [stdout] --> src/main.rs:77:9 [INFO] [stdout] | [INFO] [stdout] 77 | let original_image_len = image.len(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_image_len` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `data_len` [INFO] [stdout] --> src/main.rs:79:9 [INFO] [stdout] | [INFO] [stdout] 79 | let data_len = std::cmp::min(encrypted_data.len(), image.len()); [INFO] [stdout] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_data_len` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `Result` that must be used [INFO] [stdout] --> src/main.rs:151:5 [INFO] [stdout] | [INFO] [stdout] 151 | hide_data("demo.png", b"secret message", b"hacker"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] = note: `#[warn(unused_must_use)]` on by default [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 151 | let _ = hide_data("demo.png", b"secret message", b"hacker"); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `Result` that must be used [INFO] [stdout] --> src/main.rs:152:5 [INFO] [stdout] | [INFO] [stdout] 152 | extract_data("demo.png", b"hacker"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 152 | let _ = extract_data("demo.png", b"hacker"); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `original_image_len` [INFO] [stdout] --> src/main.rs:77:9 [INFO] [stdout] | [INFO] [stdout] 77 | let original_image_len = image.len(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_image_len` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `data_len` [INFO] [stdout] --> src/main.rs:79:9 [INFO] [stdout] | [INFO] [stdout] 79 | let data_len = std::cmp::min(encrypted_data.len(), image.len()); [INFO] [stdout] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_data_len` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `Result` that must be used [INFO] [stdout] --> src/main.rs:151:5 [INFO] [stdout] | [INFO] [stdout] 151 | hide_data("demo.png", b"secret message", b"hacker"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] = note: `#[warn(unused_must_use)]` on by default [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 151 | let _ = hide_data("demo.png", b"secret message", b"hacker"); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `Result` that must be used [INFO] [stdout] --> src/main.rs:152:5 [INFO] [stdout] | [INFO] [stdout] 152 | extract_data("demo.png", b"hacker"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 152 | let _ = extract_data("demo.png", b"hacker"); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 2.32s [INFO] running `Command { std: "docker" "inspect" "0bcd1318f5627c5cce3195393ef2ca0fa62707b1e6e25a5f0437e254e4693f8a", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "0bcd1318f5627c5cce3195393ef2ca0fa62707b1e6e25a5f0437e254e4693f8a", kill_on_drop: false }` [INFO] [stdout] 0bcd1318f5627c5cce3195393ef2ca0fa62707b1e6e25a5f0437e254e4693f8a