[INFO] fetching crate git-hooks-dispatch 0.4.2...
[INFO] checking git-hooks-dispatch-0.4.2 against try#b1f2594eac607c1f051534800237eeedb5590a49 for pr-139493-3
[INFO] extracting crate git-hooks-dispatch 0.4.2 into /workspace/builds/worker-5-tc2/source
[INFO] started tweaking crates.io crate git-hooks-dispatch 0.4.2
[INFO] finished tweaking crates.io crate git-hooks-dispatch 0.4.2
[INFO] tweaked toml for crates.io crate git-hooks-dispatch 0.4.2 written to /workspace/builds/worker-5-tc2/source/Cargo.toml
[INFO] validating manifest of crates.io crate git-hooks-dispatch 0.4.2 on toolchain b1f2594eac607c1f051534800237eeedb5590a49
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+b1f2594eac607c1f051534800237eeedb5590a49" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate crates.io crate git-hooks-dispatch 0.4.2 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+b1f2594eac607c1f051534800237eeedb5590a49" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Blocking waiting for file lock on package cache
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:aa71247004a7fa38d13ec170f48f06cdedf5bc50b2a8645e56ed7e992e6fa513" "/opt/rustwide/cargo-home/bin/cargo" "+b1f2594eac607c1f051534800237eeedb5590a49" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] bb458a2d8fa731b8f09ecd0920106424d1270126a264c1542e83c6072dfb7f70
[INFO] running `Command { std: "docker" "start" "-a" "bb458a2d8fa731b8f09ecd0920106424d1270126a264c1542e83c6072dfb7f70", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "bb458a2d8fa731b8f09ecd0920106424d1270126a264c1542e83c6072dfb7f70", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "bb458a2d8fa731b8f09ecd0920106424d1270126a264c1542e83c6072dfb7f70", kill_on_drop: false }`
[INFO] [stdout] bb458a2d8fa731b8f09ecd0920106424d1270126a264c1542e83c6072dfb7f70
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:aa71247004a7fa38d13ec170f48f06cdedf5bc50b2a8645e56ed7e992e6fa513" "/opt/rustwide/cargo-home/bin/cargo" "+b1f2594eac607c1f051534800237eeedb5590a49" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 16988e95609dc51d31f9ce877d7e7513f7312c76443df88f1267f04c45a3bec6
[INFO] running `Command { std: "docker" "start" "-a" "16988e95609dc51d31f9ce877d7e7513f7312c76443df88f1267f04c45a3bec6", kill_on_drop: false }`
[INFO] [stderr]    Compiling libc v0.2.101
[INFO] [stderr]    Compiling syn v1.0.75
[INFO] [stderr]     Checking unicode-bidi v0.3.6
[INFO] [stderr]    Compiling anyhow v1.0.43
[INFO] [stderr]     Checking float-cmp v0.8.0
[INFO] [stderr]     Checking fragile v1.0.0
[INFO] [stderr]     Checking downcast v0.10.0
[INFO] [stderr]     Checking predicates v1.0.8
[INFO] [stderr]     Checking idna v0.2.3
[INFO] [stderr]     Checking url v2.2.2
[INFO] [stderr]     Checking atty v0.2.14
[INFO] [stderr]     Checking rand v0.4.6
[INFO] [stderr]    Compiling jobserver v0.1.24
[INFO] [stderr]     Checking clap v2.33.3
[INFO] [stderr]     Checking colored v2.0.0
[INFO] [stderr]     Checking env_logger v0.9.0
[INFO] [stderr]    Compiling cc v1.0.69
[INFO] [stderr]     Checking tempdir v0.3.7
[INFO] [stderr]    Compiling openssl-sys v0.9.66
[INFO] [stderr]    Compiling libz-sys v1.1.3
[INFO] [stderr]    Compiling libssh2-sys v0.2.21
[INFO] [stderr]    Compiling libgit2-sys v0.12.22+1.1.0
[INFO] [stderr]    Compiling proc-macro-error v1.0.4
[INFO] [stderr]    Compiling structopt-derive v0.4.16
[INFO] [stderr]    Compiling mockall_derive v0.10.2
[INFO] [stderr]     Checking structopt v0.3.23
[INFO] [stderr]     Checking mockall v0.10.2
[INFO] [stderr]     Checking git2 v0.13.21
[INFO] [stderr]     Checking git-hooks-dispatch v0.4.2 (/opt/rustwide/workdir)
[INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stdout]   --> src/run.rs:49:56
[INFO] [stdout]    |
[INFO] [stdout] 49 |     let repo = git2::Repository::open(repo_dir.as_ref().clone()).unwrap();
[INFO] [stdout]    |                                                        ^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: the type `std::path::Path` does not implement `Clone`, so calling `clone` on `&std::path::Path` copies the reference, which does not do anything and can be removed
[INFO] [stdout]    = note: `#[warn(noop_method_call)]` on by default
[INFO] [stdout] help: remove this redundant call
[INFO] [stdout]    |
[INFO] [stdout] 49 -     let repo = git2::Repository::open(repo_dir.as_ref().clone()).unwrap();
[INFO] [stdout] 49 +     let repo = git2::Repository::open(repo_dir.as_ref()).unwrap();
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing
[INFO] [stdout]   --> src/run.rs:49:56
[INFO] [stdout]    |
[INFO] [stdout] 49 |     let repo = git2::Repository::open(repo_dir.as_ref().clone()).unwrap();
[INFO] [stdout]    |                                                        ^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed
[INFO] [stdout]    = note: `#[warn(noop_method_call)]` on by default
[INFO] [stdout] help: remove this redundant call
[INFO] [stdout]    |
[INFO] [stdout] 49 -     let repo = git2::Repository::open(repo_dir.as_ref().clone()).unwrap();
[INFO] [stdout] 49 +     let repo = git2::Repository::open(repo_dir.as_ref()).unwrap();
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 45.15s
[INFO] running `Command { std: "docker" "inspect" "16988e95609dc51d31f9ce877d7e7513f7312c76443df88f1267f04c45a3bec6", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "16988e95609dc51d31f9ce877d7e7513f7312c76443df88f1267f04c45a3bec6", kill_on_drop: false }`
[INFO] [stdout] 16988e95609dc51d31f9ce877d7e7513f7312c76443df88f1267f04c45a3bec6
