[INFO] cloning repository https://github.com/yasuyuky/sectora
[INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/yasuyuky/sectora" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fyasuyuky%2Fsectora", kill_on_drop: false }`
[INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fyasuyuky%2Fsectora'...
[INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }`
[INFO] [stdout] bbd40f2a9bbbda424637d6c8f8931a4974344a30
[INFO] checking yasuyuky/sectora against master#8a65ee08296b36342bf7c3cdc15312ccbc357227 for pr-142704
[INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fyasuyuky%2Fsectora" "/workspace/builds/worker-5-tc1/source", kill_on_drop: false }`
[INFO] [stderr] Cloning into '/workspace/builds/worker-5-tc1/source'...
[INFO] [stderr] done.
[INFO] validating manifest of git repo https://github.com/yasuyuky/sectora on toolchain 8a65ee08296b36342bf7c3cdc15312ccbc357227
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+8a65ee08296b36342bf7c3cdc15312ccbc357227" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking git repo https://github.com/yasuyuky/sectora
[INFO] finished tweaking git repo https://github.com/yasuyuky/sectora
[INFO] tweaked toml for git repo https://github.com/yasuyuky/sectora written to /workspace/builds/worker-5-tc1/source/Cargo.toml
[INFO] crate git repo https://github.com/yasuyuky/sectora already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+8a65ee08296b36342bf7c3cdc15312ccbc357227" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded clap_complete v4.5.54
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+8a65ee08296b36342bf7c3cdc15312ccbc357227" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] e97476d7ae6fd1e17f8d4d705d30cbfa357f9559460cd6ddad5871f96cf25e29
[INFO] running `Command { std: "docker" "start" "-a" "e97476d7ae6fd1e17f8d4d705d30cbfa357f9559460cd6ddad5871f96cf25e29", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "e97476d7ae6fd1e17f8d4d705d30cbfa357f9559460cd6ddad5871f96cf25e29", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "e97476d7ae6fd1e17f8d4d705d30cbfa357f9559460cd6ddad5871f96cf25e29", kill_on_drop: false }`
[INFO] [stdout] e97476d7ae6fd1e17f8d4d705d30cbfa357f9559460cd6ddad5871f96cf25e29
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+8a65ee08296b36342bf7c3cdc15312ccbc357227" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 0a01fd50060c7101e49ea560f59095fca7a1e4e3f769826a254ba3cdd938b32d
[INFO] running `Command { std: "docker" "start" "-a" "0a01fd50060c7101e49ea560f59095fca7a1e4e3f769826a254ba3cdd938b32d", kill_on_drop: false }`
[INFO] [stderr]    Compiling proc-macro2 v1.0.94
[INFO] [stderr]    Compiling unicode-ident v1.0.18
[INFO] [stderr]    Compiling libc v0.2.174
[INFO] [stderr]     Checking pin-project-lite v0.2.16
[INFO] [stderr]     Checking itoa v1.0.15
[INFO] [stderr]     Checking bytes v1.10.1
[INFO] [stderr]     Checking futures-core v0.3.31
[INFO] [stderr]    Compiling autocfg v1.4.0
[INFO] [stderr]     Checking futures-sink v0.3.31
[INFO] [stderr]     Checking stable_deref_trait v1.2.0
[INFO] [stderr]     Checking fnv v1.0.7
[INFO] [stderr]    Compiling shlex v1.3.0
[INFO] [stderr]     Checking once_cell v1.21.3
[INFO] [stderr]     Checking memchr v2.7.4
[INFO] [stderr]    Compiling vcpkg v0.2.15
[INFO] [stderr]     Checking futures-io v0.3.31
[INFO] [stderr]     Checking futures-task v0.3.31
[INFO] [stderr]    Compiling pkg-config v0.3.32
[INFO] [stderr]     Checking pin-utils v0.1.0
[INFO] [stderr]     Checking cfg-if v1.0.0
[INFO] [stderr]    Compiling serde v1.0.219
[INFO] [stderr]     Checking writeable v0.5.5
[INFO] [stderr]    Compiling cc v1.2.18
[INFO] [stderr]     Checking litemap v0.7.5
[INFO] [stderr]    Compiling icu_locid_transform_data v1.5.1
[INFO] [stderr]     Checking futures-channel v0.3.31
[INFO] [stderr]    Compiling icu_properties_data v1.5.1
[INFO] [stderr]     Checking hashbrown v0.15.2
[INFO] [stderr]     Checking equivalent v1.0.2
[INFO] [stderr]     Checking smallvec v1.15.0
[INFO] [stderr]     Checking bitflags v2.9.0
[INFO] [stderr]    Compiling httparse v1.10.1
[INFO] [stderr]     Checking tracing-core v0.1.33
[INFO] [stderr]    Compiling icu_normalizer_data v1.5.1
[INFO] [stderr]    Compiling openssl v0.10.72
[INFO] [stderr]     Checking tower-service v0.3.3
[INFO] [stderr]     Checking percent-encoding v2.3.1
[INFO] [stderr]     Checking foreign-types-shared v0.1.1
[INFO] [stderr]     Checking try-lock v0.2.5
[INFO] [stderr]    Compiling slab v0.4.9
[INFO] [stderr]     Checking foreign-types v0.3.2
[INFO] [stderr]     Checking log v0.4.27
[INFO] [stderr]     Checking want v0.3.1
[INFO] [stderr]    Compiling native-tls v0.2.14
[INFO] [stderr]     Checking atomic-waker v1.1.2
[INFO] [stderr]     Checking utf16_iter v1.0.5
[INFO] [stderr]     Checking indexmap v2.9.0
[INFO] [stderr]     Checking write16 v1.0.0
[INFO] [stderr]     Checking utf8_iter v1.0.4
[INFO] [stderr]     Checking utf8parse v0.2.2
[INFO] [stderr]     Checking anstyle v1.0.10
[INFO] [stderr]     Checking anstyle-query v1.1.2
[INFO] [stderr]     Checking anstyle-parse v0.2.6
[INFO] [stderr]     Checking colorchoice v1.0.3
[INFO] [stderr]     Checking tracing v0.1.41
[INFO] [stderr]     Checking openssl-probe v0.1.6
[INFO] [stderr]     Checking is_terminal_polyfill v1.70.1
[INFO] [stderr]     Checking form_urlencoded v1.2.1
[INFO] [stderr]     Checking sync_wrapper v1.0.2
[INFO] [stderr]    Compiling cfg_aliases v0.2.1
[INFO] [stderr]     Checking base64 v0.22.1
[INFO] [stderr]     Checking tower-layer v0.3.3
[INFO] [stderr]     Checking strsim v0.11.1
[INFO] [stderr]     Checking clap_lex v0.7.4
[INFO] [stderr]     Checking http v1.3.1
[INFO] [stderr]     Checking ryu v1.0.20
[INFO] [stderr]    Compiling serde_json v1.0.140
[INFO] [stderr]    Compiling heck v0.5.0
[INFO] [stderr]     Checking ipnet v2.11.0
[INFO] [stderr]     Checking powerfmt v0.2.0
[INFO] [stderr]    Compiling nix v0.30.1
[INFO] [stderr]     Checking http v0.2.12
[INFO] [stderr]     Checking time-core v0.1.4
[INFO] [stderr]     Checking num_threads v0.1.7
[INFO] [stderr]     Checking winnow v0.7.10
[INFO] [stderr]     Checking toml_write v0.1.2
[INFO] [stderr]     Checking anstream v0.6.18
[INFO] [stderr]     Checking num-conv v0.1.0
[INFO] [stderr]     Checking iri-string v0.7.8
[INFO] [stderr]     Checking encoding_rs v0.8.35
[INFO] [stderr]    Compiling sectora v0.5.0 (/opt/rustwide/workdir)
[INFO] [stderr]     Checking rustls-pki-types v1.11.0
[INFO] [stderr]     Checking deranged v0.4.1
[INFO] [stderr]     Checking mime v0.3.17
[INFO] [stderr]     Checking httpdate v1.0.3
[INFO] [stderr]     Checking clap_builder v4.5.40
[INFO] [stderr]     Checking http-body v0.4.6
[INFO] [stderr]     Checking glob v0.3.2
[INFO] [stderr]    Compiling quote v1.0.40
[INFO] [stderr]     Checking http-body v1.0.1
[INFO] [stderr]    Compiling openssl-sys v0.9.107
[INFO] [stderr]    Compiling syn v2.0.100
[INFO] [stderr]     Checking http-body-util v0.1.3
[INFO] [stderr]     Checking mio v1.0.3
[INFO] [stderr]     Checking socket2 v0.5.9
[INFO] [stderr]     Checking hostname v0.4.0
[INFO] [stderr]     Checking time v0.3.41
[INFO] [stderr]     Checking sd-notify v0.4.5
[INFO] [stderr]     Checking syslog v7.0.0
[INFO] [stderr]    Compiling synstructure v0.13.1
[INFO] [stderr]    Compiling zerofrom-derive v0.1.6
[INFO] [stderr]    Compiling yoke-derive v0.7.5
[INFO] [stderr]    Compiling zerovec-derive v0.10.3
[INFO] [stderr]    Compiling displaydoc v0.2.5
[INFO] [stderr]    Compiling tokio-macros v2.5.0
[INFO] [stderr]    Compiling futures-macro v0.3.31
[INFO] [stderr]    Compiling serde_derive v1.0.219
[INFO] [stderr]    Compiling icu_provider_macros v1.5.0
[INFO] [stderr]    Compiling openssl-macros v0.1.1
[INFO] [stderr]    Compiling clap_derive v4.5.40
[INFO] [stderr]     Checking tokio v1.45.1
[INFO] [stderr]     Checking futures-util v0.3.31
[INFO] [stderr]     Checking zerofrom v0.1.6
[INFO] [stderr]     Checking yoke v0.7.5
[INFO] [stderr]     Checking zerovec v0.10.4
[INFO] [stderr]     Checking clap v4.5.40
[INFO] [stderr]     Checking clap_complete v4.5.54
[INFO] [stderr]     Checking tinystr v0.7.6
[INFO] [stderr]     Checking icu_collections v1.5.0
[INFO] [stderr]     Checking icu_locid v1.5.0
[INFO] [stderr]     Checking icu_provider v1.5.0
[INFO] [stderr]     Checking icu_locid_transform v1.5.0
[INFO] [stderr]     Checking futures-executor v0.3.31
[INFO] [stderr]     Checking futures v0.3.31
[INFO] [stderr]     Checking icu_properties v1.5.1
[INFO] [stderr]     Checking tokio-util v0.7.14
[INFO] [stderr]     Checking tower v0.5.2
[INFO] [stderr]     Checking tokio-native-tls v0.3.1
[INFO] [stderr]     Checking hyper v0.14.32
[INFO] [stderr]     Checking h2 v0.4.8
[INFO] [stderr]     Checking tower-http v0.6.5
[INFO] [stderr]     Checking toml_datetime v0.6.11
[INFO] [stderr]     Checking serde_spanned v0.6.9
[INFO] [stderr]     Checking serde_urlencoded v0.7.1
[INFO] [stderr]     Checking toml_edit v0.22.27
[INFO] [stderr]     Checking icu_normalizer v1.5.0
[INFO] [stderr]     Checking idna_adapter v1.2.0
[INFO] [stderr]     Checking idna v1.0.3
[INFO] [stderr]     Checking url v2.5.4
[INFO] [stderr]     Checking hyper v1.6.0
[INFO] [stderr]     Checking toml v0.8.23
[INFO] [stderr]     Checking hyper-util v0.1.13
[INFO] [stderr]     Checking hyper-tls v0.6.0
[INFO] [stderr]     Checking reqwest v0.12.20
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/lib.rs:75:17
[INFO] [stdout]    |
[INFO] [stdout] 75 |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]    |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 91 |     let conn = try_unwrap!(Connection::new("_nss_sectora_getpwnam_r"), errnop);
[INFO] [stdout]    |                --------------------------------------------------------------- in this macro invocation
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/lib.rs:86:1
[INFO] [stdout]    |
[INFO] [stdout] 86 | / pub unsafe extern "C" fn _nss_sectora_getpwnam_r(cnameptr: *const libc::c_char, pwptr: *mut Passwd,
[INFO] [stdout] 87 | |                                                  buf: *mut libc::c_char, buflen: libc::size_t,
[INFO] [stdout] 88 | |                                                  errnop: *mut libc::c_int)
[INFO] [stdout] 89 | |                                                  -> libc::c_int {
[INFO] [stdout]    | |_______________________________________________________________^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default
[INFO] [stdout]    = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/lib.rs:75:17
[INFO] [stdout]    |
[INFO] [stdout] 75 |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]    |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 92 |     let msg = try_unwrap!(conn.communicate(CMsg::Pw(Pw::Nam(string_from(cnameptr)))), errnop);
[INFO] [stdout]    |               ------------------------------------------------------------------------------- in this macro invocation
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]    = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/lib.rs:99:17
[INFO] [stdout]    |
[INFO] [stdout] 99 |         match { (*pwptr).pack_args(&mut buffer, &login, uid, gid, &home, &sh) } {
[INFO] [stdout]    |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 101 |             Err(_) => fail!(errnop, Errno::ERANGE, NssStatus::TryAgain),
[INFO] [stdout]     |                       ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 104 |     fail!(errnop, Errno::ENOENT, NssStatus::NotFound)
[INFO] [stdout]     |     ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 115 |     let conn = try_unwrap!(Connection::new("_nss_sectora_getpwuid_r"), errnop);
[INFO] [stdout]     |                --------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/lib.rs:111:1
[INFO] [stdout]     |
[INFO] [stdout] 111 | / pub unsafe extern "C" fn _nss_sectora_getpwuid_r(uid: libc::uid_t, pwptr: *mut Passwd, buf: *mut libc::c_char,
[INFO] [stdout] 112 | |                                                  buflen: libc::size_t, errnop: *mut libc::c_int)
[INFO] [stdout] 113 | |                                                  -> libc::c_int {
[INFO] [stdout]     | |_______________________________________________________________^
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 116 |     let msg = try_unwrap!(conn.communicate(CMsg::Pw(Pw::Uid(uid as u64))), errnop);
[INFO] [stdout]     |               -------------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:123:17
[INFO] [stdout]     |
[INFO] [stdout] 123 |         match { (*pwptr).pack_args(&mut buffer, &login, uid, gid, &home, &sh) } {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 125 |             Err(_) => fail!(errnop, Errno::ERANGE, NssStatus::TryAgain),
[INFO] [stdout]     |                       ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 128 |     fail!(errnop, Errno::ENOENT, NssStatus::NotFound)
[INFO] [stdout]     |     ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 152 |     let conn = try_unwrap!(Connection::new("_nss_sectora_getpwent_r"), errnop);
[INFO] [stdout]     |                --------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/lib.rs:148:1
[INFO] [stdout]     |
[INFO] [stdout] 148 | / pub unsafe extern "C" fn _nss_sectora_getpwent_r(pwptr: *mut Passwd, buf: *mut libc::c_char, buflen: libc::size_t,
[INFO] [stdout] 149 | |                                                  errnop: *mut libc::c_int)
[INFO] [stdout] 150 | |                                                  -> libc::c_int {
[INFO] [stdout]     | |_______________________________________________________________^
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 153 |     let msg = try_unwrap!(conn.communicate(CMsg::Pw(Pw::Ent(Ent::Get(process::id())))), errnop);
[INFO] [stdout]     |               --------------------------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:160:17
[INFO] [stdout]     |
[INFO] [stdout] 160 |         match { (*pwptr).pack_args(&mut buffer, &login, uid, gid, &home, &sh) } {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 162 |             Err(_) => fail!(errnop, Errno::ERANGE, NssStatus::TryAgain),
[INFO] [stdout]     |                       ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 165 |     fail!(errnop, Errno::ENOENT, NssStatus::NotFound)
[INFO] [stdout]     |     ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 190 |     let conn = try_unwrap!(Connection::new("_nss_sectora_getspnam_r"), errnop);
[INFO] [stdout]     |                --------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/lib.rs:185:1
[INFO] [stdout]     |
[INFO] [stdout] 185 | / pub unsafe extern "C" fn _nss_sectora_getspnam_r(cnameptr: *const libc::c_char, spptr: *mut Spwd,
[INFO] [stdout] 186 | |                                                  buf: *mut libc::c_char, buflen: libc::size_t,
[INFO] [stdout] 187 | |                                                  errnop: *mut libc::c_int)
[INFO] [stdout] 188 | |                                                  -> libc::c_int {
[INFO] [stdout]     | |_______________________________________________________________^
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 191 |     let msg = try_unwrap!(conn.communicate(CMsg::Sp(Sp::Nam(string_from(cnameptr)))), errnop);
[INFO] [stdout]     |               ------------------------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:193:17
[INFO] [stdout]     |
[INFO] [stdout] 193 |         match { (*spptr).pack_args(&mut buffer, &login, &pass) } {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 195 |             Err(_) => fail!(errnop, Errno::ERANGE, NssStatus::TryAgain),
[INFO] [stdout]     |                       ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 198 |     fail!(errnop, Errno::ENOENT, NssStatus::NotFound)
[INFO] [stdout]     |     ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 222 |     let conn = try_unwrap!(Connection::new("_nss_sectora_getspent_r"), errnop);
[INFO] [stdout]     |                --------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/lib.rs:218:1
[INFO] [stdout]     |
[INFO] [stdout] 218 | / pub unsafe extern "C" fn _nss_sectora_getspent_r(spptr: *mut Spwd, buf: *mut libc::c_char, buflen: libc::size_t,
[INFO] [stdout] 219 | |                                                  errnop: *mut libc::c_int)
[INFO] [stdout] 220 | |                                                  -> libc::c_int {
[INFO] [stdout]     | |_______________________________________________________________^
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 223 |     let msg = try_unwrap!(conn.communicate(CMsg::Sp(Sp::Ent(Ent::Get(process::id())))), errnop);
[INFO] [stdout]     |               --------------------------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:225:17
[INFO] [stdout]     |
[INFO] [stdout] 225 |         match { (*spptr).pack_args(&mut buffer, &login, &pass) } {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 227 |             Err(_) => fail!(errnop, Errno::ERANGE, NssStatus::TryAgain),
[INFO] [stdout]     |                       ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 230 |     fail!(errnop, Errno::ENOENT, NssStatus::NotFound)
[INFO] [stdout]     |     ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 254 |     let conn = try_unwrap!(Connection::new("_nss_sectora_getgrgid_r"), errnop);
[INFO] [stdout]     |                --------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/lib.rs:250:1
[INFO] [stdout]     |
[INFO] [stdout] 250 | / pub unsafe extern "C" fn _nss_sectora_getgrgid_r(gid: libc::gid_t, grptr: *mut Group, buf: *mut libc::c_char,
[INFO] [stdout] 251 | |                                                  buflen: libc::size_t, errnop: *mut libc::c_int)
[INFO] [stdout] 252 | |                                                  -> libc::c_int {
[INFO] [stdout]     | |_______________________________________________________________^
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 255 |     let msg = try_unwrap!(conn.communicate(CMsg::Gr(Gr::Gid(gid as u64))), errnop);
[INFO] [stdout]     |               -------------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:258:17
[INFO] [stdout]     |
[INFO] [stdout] 258 |         match { (*grptr).pack_args(&mut buffer, &sector.get_group(), u64::from(gid), &members) } {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 260 |             Err(_) => fail!(errnop, Errno::ERANGE, NssStatus::TryAgain),
[INFO] [stdout]     |                       ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 263 |     fail!(errnop, Errno::ENOENT, NssStatus::NotFound)
[INFO] [stdout]     |     ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 275 |     let conn = try_unwrap!(Connection::new("_nss_sectora_getgrnam_r"), errnop);
[INFO] [stdout]     |                --------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/lib.rs:270:1
[INFO] [stdout]     |
[INFO] [stdout] 270 | / pub unsafe extern "C" fn _nss_sectora_getgrnam_r(cnameptr: *const libc::c_char, grptr: *mut Group,
[INFO] [stdout] 271 | |                                                  buf: *mut libc::c_char, buflen: libc::size_t,
[INFO] [stdout] 272 | |                                                  errnop: *mut libc::c_int)
[INFO] [stdout] 273 | |                                                  -> libc::c_int {
[INFO] [stdout]     | |_______________________________________________________________^
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 276 |     let msg = try_unwrap!(conn.communicate(CMsg::Gr(Gr::Nam(string_from(cnameptr)))), errnop);
[INFO] [stdout]     |               ------------------------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:279:17
[INFO] [stdout]     |
[INFO] [stdout] 279 |         match { (*grptr).pack_args(&mut buffer, &sector.get_group(), sector.get_gid(), &members) } {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 281 |             Err(_) => fail!(errnop, Errno::ERANGE, NssStatus::TryAgain),
[INFO] [stdout]     |                       ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 284 |     fail!(errnop, Errno::ENOENT, NssStatus::NotFound)
[INFO] [stdout]     |     ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 308 |     let conn = try_unwrap!(Connection::new("_nss_sectora_getgrent_r"), errnop);
[INFO] [stdout]     |                --------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/lib.rs:304:1
[INFO] [stdout]     |
[INFO] [stdout] 304 | / pub unsafe extern "C" fn _nss_sectora_getgrent_r(grptr: *mut Group, buf: *mut libc::c_char, buflen: libc::size_t,
[INFO] [stdout] 305 | |                                                  errnop: *mut libc::c_int)
[INFO] [stdout] 306 | |                                                  -> libc::c_int {
[INFO] [stdout]     | |_______________________________________________________________^
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 309 |     let msg = try_unwrap!(conn.communicate(CMsg::Gr(Gr::Ent(Ent::Get(process::id())))), errnop);
[INFO] [stdout]     |               --------------------------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:312:17
[INFO] [stdout]     |
[INFO] [stdout] 312 |         match { (*grptr).pack_args(&mut buffer, &sector.get_group(), sector.get_gid(), &members) } {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 314 |             Err(_) => fail!(errnop, Errno::ERANGE, NssStatus::TryAgain),
[INFO] [stdout]     |                       ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 317 |     fail!(errnop, Errno::ENOENT, NssStatus::NotFound)
[INFO] [stdout]     |     ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:3:11
[INFO] [stdout]   |
[INFO] [stdout] 3 |     Serde(serde_json::Error),
[INFO] [stdout]   |     ----- ^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]   = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 3 -     Serde(serde_json::Error),
[INFO] [stdout] 3 +     Serde(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:4:8
[INFO] [stdout]   |
[INFO] [stdout] 4 |     Io(std::io::Error),
[INFO] [stdout]   |     -- ^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 4 -     Io(std::io::Error),
[INFO] [stdout] 4 +     Io(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:5:10
[INFO] [stdout]   |
[INFO] [stdout] 5 |     Toml(toml::de::Error),
[INFO] [stdout]   |     ---- ^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 5 -     Toml(toml::de::Error),
[INFO] [stdout] 5 +     Toml(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:6:14
[INFO] [stdout]   |
[INFO] [stdout] 6 |     ParseMsg(ParseMessageError),
[INFO] [stdout]   |     -------- ^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 6 -     ParseMsg(ParseMessageError),
[INFO] [stdout] 6 +     ParseMsg(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:26:8
[INFO] [stdout]    |
[INFO] [stdout] 26 |     Id(std::num::ParseIntError),
[INFO] [stdout]    |     -- ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 26 -     Id(std::num::ParseIntError),
[INFO] [stdout] 26 +     Id(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:33:12
[INFO] [stdout]    |
[INFO] [stdout] 33 |     Sector(ParseSectorError),
[INFO] [stdout]    |     ------ ^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 33 -     Sector(ParseSectorError),
[INFO] [stdout] 33 +     Sector(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:34:9
[INFO] [stdout]    |
[INFO] [stdout] 34 |     Gid(std::num::ParseIntError),
[INFO] [stdout]    |     --- ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 34 -     Gid(std::num::ParseIntError),
[INFO] [stdout] 34 +     Gid(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:35:12
[INFO] [stdout]    |
[INFO] [stdout] 35 |     Member(std::num::ParseIntError),
[INFO] [stdout]    |     ------ ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 35 -     Member(std::num::ParseIntError),
[INFO] [stdout] 35 +     Member(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: multiple fields are never read
[INFO] [stdout]   --> src/structs.rs:12:9
[INFO] [stdout]    |
[INFO] [stdout] 11 | pub struct Config {
[INFO] [stdout]    |            ------ fields in this struct
[INFO] [stdout] 12 |     pub token: String,
[INFO] [stdout]    |         ^^^^^
[INFO] [stdout] 13 |     pub org: String,
[INFO] [stdout]    |         ^^^
[INFO] [stdout] 14 |     #[serde(default = "default_team")]
[INFO] [stdout] 15 |     pub team: Vec<TeamConfig>,
[INFO] [stdout]    |         ^^^^
[INFO] [stdout] 16 |     #[serde(default = "default_repo")]
[INFO] [stdout] 17 |     pub repo: Vec<RepoConfig>,
[INFO] [stdout]    |         ^^^^
[INFO] [stdout] 18 |     #[serde(default = "default_endpoint")]
[INFO] [stdout] 19 |     pub endpoint: String,
[INFO] [stdout]    |         ^^^^^^^^
[INFO] [stdout] 20 |     #[serde(default = "default_home")]
[INFO] [stdout] 21 |     pub home: String,
[INFO] [stdout]    |         ^^^^
[INFO] [stdout] 22 |     #[serde(default = "default_sh")]
[INFO] [stdout] 23 |     pub sh: String,
[INFO] [stdout]    |         ^^
[INFO] [stdout] 24 |     #[serde(default = "default_cache_duration")]
[INFO] [stdout] 25 |     pub cache_duration: u64,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^
[INFO] [stdout] 26 |     #[serde(default = "default_cert_path")]
[INFO] [stdout] 27 |     pub cert_path: String,
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout] 28 |     #[serde(default = "default_user_conf_path")]
[INFO] [stdout] 29 |     pub user_conf_path: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^
[INFO] [stdout] 30 |     #[serde(default = "default_cache_dir")]
[INFO] [stdout] 31 |     pub cache_dir: String,
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout] 32 |     pub proxy_url: Option<String>,
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `Config` has derived impls for the traits `Debug` and `Clone`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/lib.rs:75:17
[INFO] [stdout]    |
[INFO] [stdout] 75 |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]    |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 91 |     let conn = try_unwrap!(Connection::new("_nss_sectora_getpwnam_r"), errnop);
[INFO] [stdout]    |                --------------------------------------------------------------- in this macro invocation
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/lib.rs:86:1
[INFO] [stdout]    |
[INFO] [stdout] 86 | / pub unsafe extern "C" fn _nss_sectora_getpwnam_r(cnameptr: *const libc::c_char, pwptr: *mut Passwd,
[INFO] [stdout] 87 | |                                                  buf: *mut libc::c_char, buflen: libc::size_t,
[INFO] [stdout] 88 | |                                                  errnop: *mut libc::c_int)
[INFO] [stdout] 89 | |                                                  -> libc::c_int {
[INFO] [stdout]    | |_______________________________________________________________^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default
[INFO] [stdout]    = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/lib.rs:75:17
[INFO] [stdout]    |
[INFO] [stdout] 75 |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]    |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 92 |     let msg = try_unwrap!(conn.communicate(CMsg::Pw(Pw::Nam(string_from(cnameptr)))), errnop);
[INFO] [stdout]    |               ------------------------------------------------------------------------------- in this macro invocation
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]    = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/lib.rs:99:17
[INFO] [stdout]    |
[INFO] [stdout] 99 |         match { (*pwptr).pack_args(&mut buffer, &login, uid, gid, &home, &sh) } {
[INFO] [stdout]    |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 101 |             Err(_) => fail!(errnop, Errno::ERANGE, NssStatus::TryAgain),
[INFO] [stdout]     |                       ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 104 |     fail!(errnop, Errno::ENOENT, NssStatus::NotFound)
[INFO] [stdout]     |     ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 115 |     let conn = try_unwrap!(Connection::new("_nss_sectora_getpwuid_r"), errnop);
[INFO] [stdout]     |                --------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/lib.rs:111:1
[INFO] [stdout]     |
[INFO] [stdout] 111 | / pub unsafe extern "C" fn _nss_sectora_getpwuid_r(uid: libc::uid_t, pwptr: *mut Passwd, buf: *mut libc::c_char,
[INFO] [stdout] 112 | |                                                  buflen: libc::size_t, errnop: *mut libc::c_int)
[INFO] [stdout] 113 | |                                                  -> libc::c_int {
[INFO] [stdout]     | |_______________________________________________________________^
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 116 |     let msg = try_unwrap!(conn.communicate(CMsg::Pw(Pw::Uid(uid as u64))), errnop);
[INFO] [stdout]     |               -------------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:123:17
[INFO] [stdout]     |
[INFO] [stdout] 123 |         match { (*pwptr).pack_args(&mut buffer, &login, uid, gid, &home, &sh) } {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 125 |             Err(_) => fail!(errnop, Errno::ERANGE, NssStatus::TryAgain),
[INFO] [stdout]     |                       ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 128 |     fail!(errnop, Errno::ENOENT, NssStatus::NotFound)
[INFO] [stdout]     |     ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 152 |     let conn = try_unwrap!(Connection::new("_nss_sectora_getpwent_r"), errnop);
[INFO] [stdout]     |                --------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/lib.rs:148:1
[INFO] [stdout]     |
[INFO] [stdout] 148 | / pub unsafe extern "C" fn _nss_sectora_getpwent_r(pwptr: *mut Passwd, buf: *mut libc::c_char, buflen: libc::size_t,
[INFO] [stdout] 149 | |                                                  errnop: *mut libc::c_int)
[INFO] [stdout] 150 | |                                                  -> libc::c_int {
[INFO] [stdout]     | |_______________________________________________________________^
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 153 |     let msg = try_unwrap!(conn.communicate(CMsg::Pw(Pw::Ent(Ent::Get(process::id())))), errnop);
[INFO] [stdout]     |               --------------------------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:160:17
[INFO] [stdout]     |
[INFO] [stdout] 160 |         match { (*pwptr).pack_args(&mut buffer, &login, uid, gid, &home, &sh) } {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 162 |             Err(_) => fail!(errnop, Errno::ERANGE, NssStatus::TryAgain),
[INFO] [stdout]     |                       ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 165 |     fail!(errnop, Errno::ENOENT, NssStatus::NotFound)
[INFO] [stdout]     |     ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 190 |     let conn = try_unwrap!(Connection::new("_nss_sectora_getspnam_r"), errnop);
[INFO] [stdout]     |                --------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/lib.rs:185:1
[INFO] [stdout]     |
[INFO] [stdout] 185 | / pub unsafe extern "C" fn _nss_sectora_getspnam_r(cnameptr: *const libc::c_char, spptr: *mut Spwd,
[INFO] [stdout] 186 | |                                                  buf: *mut libc::c_char, buflen: libc::size_t,
[INFO] [stdout] 187 | |                                                  errnop: *mut libc::c_int)
[INFO] [stdout] 188 | |                                                  -> libc::c_int {
[INFO] [stdout]     | |_______________________________________________________________^
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 191 |     let msg = try_unwrap!(conn.communicate(CMsg::Sp(Sp::Nam(string_from(cnameptr)))), errnop);
[INFO] [stdout]     |               ------------------------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:193:17
[INFO] [stdout]     |
[INFO] [stdout] 193 |         match { (*spptr).pack_args(&mut buffer, &login, &pass) } {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 195 |             Err(_) => fail!(errnop, Errno::ERANGE, NssStatus::TryAgain),
[INFO] [stdout]     |                       ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 198 |     fail!(errnop, Errno::ENOENT, NssStatus::NotFound)
[INFO] [stdout]     |     ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 222 |     let conn = try_unwrap!(Connection::new("_nss_sectora_getspent_r"), errnop);
[INFO] [stdout]     |                --------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/lib.rs:218:1
[INFO] [stdout]     |
[INFO] [stdout] 218 | / pub unsafe extern "C" fn _nss_sectora_getspent_r(spptr: *mut Spwd, buf: *mut libc::c_char, buflen: libc::size_t,
[INFO] [stdout] 219 | |                                                  errnop: *mut libc::c_int)
[INFO] [stdout] 220 | |                                                  -> libc::c_int {
[INFO] [stdout]     | |_______________________________________________________________^
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 223 |     let msg = try_unwrap!(conn.communicate(CMsg::Sp(Sp::Ent(Ent::Get(process::id())))), errnop);
[INFO] [stdout]     |               --------------------------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:225:17
[INFO] [stdout]     |
[INFO] [stdout] 225 |         match { (*spptr).pack_args(&mut buffer, &login, &pass) } {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 227 |             Err(_) => fail!(errnop, Errno::ERANGE, NssStatus::TryAgain),
[INFO] [stdout]     |                       ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 230 |     fail!(errnop, Errno::ENOENT, NssStatus::NotFound)
[INFO] [stdout]     |     ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 254 |     let conn = try_unwrap!(Connection::new("_nss_sectora_getgrgid_r"), errnop);
[INFO] [stdout]     |                --------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/lib.rs:250:1
[INFO] [stdout]     |
[INFO] [stdout] 250 | / pub unsafe extern "C" fn _nss_sectora_getgrgid_r(gid: libc::gid_t, grptr: *mut Group, buf: *mut libc::c_char,
[INFO] [stdout] 251 | |                                                  buflen: libc::size_t, errnop: *mut libc::c_int)
[INFO] [stdout] 252 | |                                                  -> libc::c_int {
[INFO] [stdout]     | |_______________________________________________________________^
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 255 |     let msg = try_unwrap!(conn.communicate(CMsg::Gr(Gr::Gid(gid as u64))), errnop);
[INFO] [stdout]     |               -------------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:258:17
[INFO] [stdout]     |
[INFO] [stdout] 258 |         match { (*grptr).pack_args(&mut buffer, &sector.get_group(), u64::from(gid), &members) } {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 260 |             Err(_) => fail!(errnop, Errno::ERANGE, NssStatus::TryAgain),
[INFO] [stdout]     |                       ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 263 |     fail!(errnop, Errno::ENOENT, NssStatus::NotFound)
[INFO] [stdout]     |     ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 275 |     let conn = try_unwrap!(Connection::new("_nss_sectora_getgrnam_r"), errnop);
[INFO] [stdout]     |                --------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/lib.rs:270:1
[INFO] [stdout]     |
[INFO] [stdout] 270 | / pub unsafe extern "C" fn _nss_sectora_getgrnam_r(cnameptr: *const libc::c_char, grptr: *mut Group,
[INFO] [stdout] 271 | |                                                  buf: *mut libc::c_char, buflen: libc::size_t,
[INFO] [stdout] 272 | |                                                  errnop: *mut libc::c_int)
[INFO] [stdout] 273 | |                                                  -> libc::c_int {
[INFO] [stdout]     | |_______________________________________________________________^
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 276 |     let msg = try_unwrap!(conn.communicate(CMsg::Gr(Gr::Nam(string_from(cnameptr)))), errnop);
[INFO] [stdout]     |               ------------------------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:279:17
[INFO] [stdout]     |
[INFO] [stdout] 279 |         match { (*grptr).pack_args(&mut buffer, &sector.get_group(), sector.get_gid(), &members) } {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 281 |             Err(_) => fail!(errnop, Errno::ERANGE, NssStatus::TryAgain),
[INFO] [stdout]     |                       ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 284 |     fail!(errnop, Errno::ENOENT, NssStatus::NotFound)
[INFO] [stdout]     |     ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 308 |     let conn = try_unwrap!(Connection::new("_nss_sectora_getgrent_r"), errnop);
[INFO] [stdout]     |                --------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/lib.rs:304:1
[INFO] [stdout]     |
[INFO] [stdout] 304 | / pub unsafe extern "C" fn _nss_sectora_getgrent_r(grptr: *mut Group, buf: *mut libc::c_char, buflen: libc::size_t,
[INFO] [stdout] 305 | |                                                  errnop: *mut libc::c_int)
[INFO] [stdout] 306 | |                                                  -> libc::c_int {
[INFO] [stdout]     | |_______________________________________________________________^
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:75:17
[INFO] [stdout]     |
[INFO] [stdout] 75  |                 *$err_no_p = Errno::EAGAIN as libc::c_int;
[INFO] [stdout]     |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 309 |     let msg = try_unwrap!(conn.communicate(CMsg::Gr(Gr::Ent(Ent::Get(process::id())))), errnop);
[INFO] [stdout]     |               --------------------------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `try_unwrap` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:312:17
[INFO] [stdout]     |
[INFO] [stdout] 312 |         match { (*grptr).pack_args(&mut buffer, &sector.get_group(), sector.get_gid(), &members) } {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 314 |             Err(_) => fail!(errnop, Errno::ERANGE, NssStatus::TryAgain),
[INFO] [stdout]     |                       ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/lib.rs:51:9
[INFO] [stdout]     |
[INFO] [stdout] 51  |         *$err_no_p = $err_no as libc::c_int;
[INFO] [stdout]     |         ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout] ...
[INFO] [stdout] 317 |     fail!(errnop, Errno::ENOENT, NssStatus::NotFound)
[INFO] [stdout]     |     ------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: this warning originates in the macro `fail` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:3:11
[INFO] [stdout]   |
[INFO] [stdout] 3 |     Serde(serde_json::Error),
[INFO] [stdout]   |     ----- ^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]   = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 3 -     Serde(serde_json::Error),
[INFO] [stdout] 3 +     Serde(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:4:8
[INFO] [stdout]   |
[INFO] [stdout] 4 |     Io(std::io::Error),
[INFO] [stdout]   |     -- ^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 4 -     Io(std::io::Error),
[INFO] [stdout] 4 +     Io(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:5:10
[INFO] [stdout]   |
[INFO] [stdout] 5 |     Toml(toml::de::Error),
[INFO] [stdout]   |     ---- ^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 5 -     Toml(toml::de::Error),
[INFO] [stdout] 5 +     Toml(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:6:14
[INFO] [stdout]   |
[INFO] [stdout] 6 |     ParseMsg(ParseMessageError),
[INFO] [stdout]   |     -------- ^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 6 -     ParseMsg(ParseMessageError),
[INFO] [stdout] 6 +     ParseMsg(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:26:8
[INFO] [stdout]    |
[INFO] [stdout] 26 |     Id(std::num::ParseIntError),
[INFO] [stdout]    |     -- ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 26 -     Id(std::num::ParseIntError),
[INFO] [stdout] 26 +     Id(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:33:12
[INFO] [stdout]    |
[INFO] [stdout] 33 |     Sector(ParseSectorError),
[INFO] [stdout]    |     ------ ^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 33 -     Sector(ParseSectorError),
[INFO] [stdout] 33 +     Sector(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:34:9
[INFO] [stdout]    |
[INFO] [stdout] 34 |     Gid(std::num::ParseIntError),
[INFO] [stdout]    |     --- ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 34 -     Gid(std::num::ParseIntError),
[INFO] [stdout] 34 +     Gid(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:35:12
[INFO] [stdout]    |
[INFO] [stdout] 35 |     Member(std::num::ParseIntError),
[INFO] [stdout]    |     ------ ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 35 -     Member(std::num::ParseIntError),
[INFO] [stdout] 35 +     Member(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: multiple fields are never read
[INFO] [stdout]   --> src/structs.rs:12:9
[INFO] [stdout]    |
[INFO] [stdout] 11 | pub struct Config {
[INFO] [stdout]    |            ------ fields in this struct
[INFO] [stdout] 12 |     pub token: String,
[INFO] [stdout]    |         ^^^^^
[INFO] [stdout] 13 |     pub org: String,
[INFO] [stdout]    |         ^^^
[INFO] [stdout] 14 |     #[serde(default = "default_team")]
[INFO] [stdout] 15 |     pub team: Vec<TeamConfig>,
[INFO] [stdout]    |         ^^^^
[INFO] [stdout] 16 |     #[serde(default = "default_repo")]
[INFO] [stdout] 17 |     pub repo: Vec<RepoConfig>,
[INFO] [stdout]    |         ^^^^
[INFO] [stdout] 18 |     #[serde(default = "default_endpoint")]
[INFO] [stdout] 19 |     pub endpoint: String,
[INFO] [stdout]    |         ^^^^^^^^
[INFO] [stdout] 20 |     #[serde(default = "default_home")]
[INFO] [stdout] 21 |     pub home: String,
[INFO] [stdout]    |         ^^^^
[INFO] [stdout] 22 |     #[serde(default = "default_sh")]
[INFO] [stdout] 23 |     pub sh: String,
[INFO] [stdout]    |         ^^
[INFO] [stdout] 24 |     #[serde(default = "default_cache_duration")]
[INFO] [stdout] 25 |     pub cache_duration: u64,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^
[INFO] [stdout] 26 |     #[serde(default = "default_cert_path")]
[INFO] [stdout] 27 |     pub cert_path: String,
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout] 28 |     #[serde(default = "default_user_conf_path")]
[INFO] [stdout] 29 |     pub user_conf_path: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^
[INFO] [stdout] 30 |     #[serde(default = "default_cache_dir")]
[INFO] [stdout] 31 |     pub cache_dir: String,
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout] 32 |     pub proxy_url: Option<String>,
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `Config` has derived impls for the traits `Debug` and `Clone`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:3:11
[INFO] [stdout]   |
[INFO] [stdout] 3 |     Serde(serde_json::Error),
[INFO] [stdout]   |     ----- ^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]   = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 3 -     Serde(serde_json::Error),
[INFO] [stdout] 3 +     Serde(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:4:8
[INFO] [stdout]   |
[INFO] [stdout] 4 |     Io(std::io::Error),
[INFO] [stdout]   |     -- ^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 4 -     Io(std::io::Error),
[INFO] [stdout] 4 +     Io(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:5:10
[INFO] [stdout]   |
[INFO] [stdout] 5 |     Toml(toml::de::Error),
[INFO] [stdout]   |     ---- ^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 5 -     Toml(toml::de::Error),
[INFO] [stdout] 5 +     Toml(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:6:14
[INFO] [stdout]   |
[INFO] [stdout] 6 |     ParseMsg(ParseMessageError),
[INFO] [stdout]   |     -------- ^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 6 -     ParseMsg(ParseMessageError),
[INFO] [stdout] 6 +     ParseMsg(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:26:8
[INFO] [stdout]    |
[INFO] [stdout] 26 |     Id(std::num::ParseIntError),
[INFO] [stdout]    |     -- ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 26 -     Id(std::num::ParseIntError),
[INFO] [stdout] 26 +     Id(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:33:12
[INFO] [stdout]    |
[INFO] [stdout] 33 |     Sector(ParseSectorError),
[INFO] [stdout]    |     ------ ^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 33 -     Sector(ParseSectorError),
[INFO] [stdout] 33 +     Sector(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:34:9
[INFO] [stdout]    |
[INFO] [stdout] 34 |     Gid(std::num::ParseIntError),
[INFO] [stdout]    |     --- ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 34 -     Gid(std::num::ParseIntError),
[INFO] [stdout] 34 +     Gid(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:35:12
[INFO] [stdout]    |
[INFO] [stdout] 35 |     Member(std::num::ParseIntError),
[INFO] [stdout]    |     ------ ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 35 -     Member(std::num::ParseIntError),
[INFO] [stdout] 35 +     Member(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: multiple fields are never read
[INFO] [stdout]   --> src/structs.rs:12:9
[INFO] [stdout]    |
[INFO] [stdout] 11 | pub struct Config {
[INFO] [stdout]    |            ------ fields in this struct
[INFO] [stdout] 12 |     pub token: String,
[INFO] [stdout]    |         ^^^^^
[INFO] [stdout] 13 |     pub org: String,
[INFO] [stdout]    |         ^^^
[INFO] [stdout] 14 |     #[serde(default = "default_team")]
[INFO] [stdout] 15 |     pub team: Vec<TeamConfig>,
[INFO] [stdout]    |         ^^^^
[INFO] [stdout] 16 |     #[serde(default = "default_repo")]
[INFO] [stdout] 17 |     pub repo: Vec<RepoConfig>,
[INFO] [stdout]    |         ^^^^
[INFO] [stdout] 18 |     #[serde(default = "default_endpoint")]
[INFO] [stdout] 19 |     pub endpoint: String,
[INFO] [stdout]    |         ^^^^^^^^
[INFO] [stdout] 20 |     #[serde(default = "default_home")]
[INFO] [stdout] 21 |     pub home: String,
[INFO] [stdout]    |         ^^^^
[INFO] [stdout] 22 |     #[serde(default = "default_sh")]
[INFO] [stdout] 23 |     pub sh: String,
[INFO] [stdout]    |         ^^
[INFO] [stdout] 24 |     #[serde(default = "default_cache_duration")]
[INFO] [stdout] 25 |     pub cache_duration: u64,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^
[INFO] [stdout] 26 |     #[serde(default = "default_cert_path")]
[INFO] [stdout] 27 |     pub cert_path: String,
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout] 28 |     #[serde(default = "default_user_conf_path")]
[INFO] [stdout] 29 |     pub user_conf_path: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^
[INFO] [stdout] 30 |     #[serde(default = "default_cache_dir")]
[INFO] [stdout] 31 |     pub cache_dir: String,
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout] 32 |     pub proxy_url: Option<String>,
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `Config` has derived impls for the traits `Debug` and `Clone`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:3:11
[INFO] [stdout]   |
[INFO] [stdout] 3 |     Serde(serde_json::Error),
[INFO] [stdout]   |     ----- ^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]   = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 3 -     Serde(serde_json::Error),
[INFO] [stdout] 3 +     Serde(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:4:8
[INFO] [stdout]   |
[INFO] [stdout] 4 |     Io(std::io::Error),
[INFO] [stdout]   |     -- ^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 4 -     Io(std::io::Error),
[INFO] [stdout] 4 +     Io(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:5:10
[INFO] [stdout]   |
[INFO] [stdout] 5 |     Toml(toml::de::Error),
[INFO] [stdout]   |     ---- ^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 5 -     Toml(toml::de::Error),
[INFO] [stdout] 5 +     Toml(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:6:14
[INFO] [stdout]   |
[INFO] [stdout] 6 |     ParseMsg(ParseMessageError),
[INFO] [stdout]   |     -------- ^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 6 -     ParseMsg(ParseMessageError),
[INFO] [stdout] 6 +     ParseMsg(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:26:8
[INFO] [stdout]    |
[INFO] [stdout] 26 |     Id(std::num::ParseIntError),
[INFO] [stdout]    |     -- ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 26 -     Id(std::num::ParseIntError),
[INFO] [stdout] 26 +     Id(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:33:12
[INFO] [stdout]    |
[INFO] [stdout] 33 |     Sector(ParseSectorError),
[INFO] [stdout]    |     ------ ^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 33 -     Sector(ParseSectorError),
[INFO] [stdout] 33 +     Sector(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:34:9
[INFO] [stdout]    |
[INFO] [stdout] 34 |     Gid(std::num::ParseIntError),
[INFO] [stdout]    |     --- ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 34 -     Gid(std::num::ParseIntError),
[INFO] [stdout] 34 +     Gid(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:35:12
[INFO] [stdout]    |
[INFO] [stdout] 35 |     Member(std::num::ParseIntError),
[INFO] [stdout]    |     ------ ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 35 -     Member(std::num::ParseIntError),
[INFO] [stdout] 35 +     Member(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: multiple fields are never read
[INFO] [stdout]   --> src/structs.rs:12:9
[INFO] [stdout]    |
[INFO] [stdout] 11 | pub struct Config {
[INFO] [stdout]    |            ------ fields in this struct
[INFO] [stdout] 12 |     pub token: String,
[INFO] [stdout]    |         ^^^^^
[INFO] [stdout] 13 |     pub org: String,
[INFO] [stdout]    |         ^^^
[INFO] [stdout] 14 |     #[serde(default = "default_team")]
[INFO] [stdout] 15 |     pub team: Vec<TeamConfig>,
[INFO] [stdout]    |         ^^^^
[INFO] [stdout] 16 |     #[serde(default = "default_repo")]
[INFO] [stdout] 17 |     pub repo: Vec<RepoConfig>,
[INFO] [stdout]    |         ^^^^
[INFO] [stdout] 18 |     #[serde(default = "default_endpoint")]
[INFO] [stdout] 19 |     pub endpoint: String,
[INFO] [stdout]    |         ^^^^^^^^
[INFO] [stdout] 20 |     #[serde(default = "default_home")]
[INFO] [stdout] 21 |     pub home: String,
[INFO] [stdout]    |         ^^^^
[INFO] [stdout] 22 |     #[serde(default = "default_sh")]
[INFO] [stdout] 23 |     pub sh: String,
[INFO] [stdout]    |         ^^
[INFO] [stdout] 24 |     #[serde(default = "default_cache_duration")]
[INFO] [stdout] 25 |     pub cache_duration: u64,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^
[INFO] [stdout] 26 |     #[serde(default = "default_cert_path")]
[INFO] [stdout] 27 |     pub cert_path: String,
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout] 28 |     #[serde(default = "default_user_conf_path")]
[INFO] [stdout] 29 |     pub user_conf_path: String,
[INFO] [stdout]    |         ^^^^^^^^^^^^^^
[INFO] [stdout] 30 |     #[serde(default = "default_cache_dir")]
[INFO] [stdout] 31 |     pub cache_dir: String,
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout] 32 |     pub proxy_url: Option<String>,
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `Config` has derived impls for the traits `Debug` and `Clone`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:3:11
[INFO] [stdout]   |
[INFO] [stdout] 3 |     Serde(serde_json::Error),
[INFO] [stdout]   |     ----- ^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]   = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 3 -     Serde(serde_json::Error),
[INFO] [stdout] 3 +     Serde(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:4:8
[INFO] [stdout]   |
[INFO] [stdout] 4 |     Io(std::io::Error),
[INFO] [stdout]   |     -- ^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 4 -     Io(std::io::Error),
[INFO] [stdout] 4 +     Io(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:5:10
[INFO] [stdout]   |
[INFO] [stdout] 5 |     Toml(toml::de::Error),
[INFO] [stdout]   |     ---- ^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 5 -     Toml(toml::de::Error),
[INFO] [stdout] 5 +     Toml(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:6:14
[INFO] [stdout]   |
[INFO] [stdout] 6 |     ParseMsg(ParseMessageError),
[INFO] [stdout]   |     -------- ^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 6 -     ParseMsg(ParseMessageError),
[INFO] [stdout] 6 +     ParseMsg(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:26:8
[INFO] [stdout]    |
[INFO] [stdout] 26 |     Id(std::num::ParseIntError),
[INFO] [stdout]    |     -- ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 26 -     Id(std::num::ParseIntError),
[INFO] [stdout] 26 +     Id(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:33:12
[INFO] [stdout]    |
[INFO] [stdout] 33 |     Sector(ParseSectorError),
[INFO] [stdout]    |     ------ ^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 33 -     Sector(ParseSectorError),
[INFO] [stdout] 33 +     Sector(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:34:9
[INFO] [stdout]    |
[INFO] [stdout] 34 |     Gid(std::num::ParseIntError),
[INFO] [stdout]    |     --- ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 34 -     Gid(std::num::ParseIntError),
[INFO] [stdout] 34 +     Gid(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:35:12
[INFO] [stdout]    |
[INFO] [stdout] 35 |     Member(std::num::ParseIntError),
[INFO] [stdout]    |     ------ ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 35 -     Member(std::num::ParseIntError),
[INFO] [stdout] 35 +     Member(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `proxy_url` is never read
[INFO] [stdout]   --> src/structs.rs:32:9
[INFO] [stdout]    |
[INFO] [stdout] 11 | pub struct Config {
[INFO] [stdout]    |            ------ field in this struct
[INFO] [stdout] ...
[INFO] [stdout] 32 |     pub proxy_url: Option<String>,
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `Config` has derived impls for the traits `Debug` and `Clone`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:3:11
[INFO] [stdout]   |
[INFO] [stdout] 3 |     Serde(serde_json::Error),
[INFO] [stdout]   |     ----- ^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]   = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 3 -     Serde(serde_json::Error),
[INFO] [stdout] 3 +     Serde(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:4:8
[INFO] [stdout]   |
[INFO] [stdout] 4 |     Io(std::io::Error),
[INFO] [stdout]   |     -- ^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 4 -     Io(std::io::Error),
[INFO] [stdout] 4 +     Io(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:5:10
[INFO] [stdout]   |
[INFO] [stdout] 5 |     Toml(toml::de::Error),
[INFO] [stdout]   |     ---- ^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 5 -     Toml(toml::de::Error),
[INFO] [stdout] 5 +     Toml(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]  --> src/error.rs:6:14
[INFO] [stdout]   |
[INFO] [stdout] 6 |     ParseMsg(ParseMessageError),
[INFO] [stdout]   |     -------- ^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |     |
[INFO] [stdout]   |     field in this variant
[INFO] [stdout]   |
[INFO] [stdout]   = note: `Error` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]   |
[INFO] [stdout] 6 -     ParseMsg(ParseMessageError),
[INFO] [stdout] 6 +     ParseMsg(()),
[INFO] [stdout]   |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:26:8
[INFO] [stdout]    |
[INFO] [stdout] 26 |     Id(std::num::ParseIntError),
[INFO] [stdout]    |     -- ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 26 -     Id(std::num::ParseIntError),
[INFO] [stdout] 26 +     Id(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:33:12
[INFO] [stdout]    |
[INFO] [stdout] 33 |     Sector(ParseSectorError),
[INFO] [stdout]    |     ------ ^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 33 -     Sector(ParseSectorError),
[INFO] [stdout] 33 +     Sector(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:34:9
[INFO] [stdout]    |
[INFO] [stdout] 34 |     Gid(std::num::ParseIntError),
[INFO] [stdout]    |     --- ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 34 -     Gid(std::num::ParseIntError),
[INFO] [stdout] 34 +     Gid(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]   --> src/error.rs:35:12
[INFO] [stdout]    |
[INFO] [stdout] 35 |     Member(std::num::ParseIntError),
[INFO] [stdout]    |     ------ ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |     |
[INFO] [stdout]    |     field in this variant
[INFO] [stdout]    |
[INFO] [stdout]    = note: `ParseSectorGroupError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]    |
[INFO] [stdout] 35 -     Member(std::num::ParseIntError),
[INFO] [stdout] 35 +     Member(()),
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `proxy_url` is never read
[INFO] [stdout]   --> src/structs.rs:32:9
[INFO] [stdout]    |
[INFO] [stdout] 11 | pub struct Config {
[INFO] [stdout]    |            ------ field in this struct
[INFO] [stdout] ...
[INFO] [stdout] 32 |     pub proxy_url: Option<String>,
[INFO] [stdout]    |         ^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `Config` has derived impls for the traits `Debug` and `Clone`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 32.80s
[INFO] running `Command { std: "docker" "inspect" "0a01fd50060c7101e49ea560f59095fca7a1e4e3f769826a254ba3cdd938b32d", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "0a01fd50060c7101e49ea560f59095fca7a1e4e3f769826a254ba3cdd938b32d", kill_on_drop: false }`
[INFO] [stdout] 0a01fd50060c7101e49ea560f59095fca7a1e4e3f769826a254ba3cdd938b32d
