[INFO] cloning repository https://github.com/emersonmde/badcoin [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/emersonmde/badcoin" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Femersonmde%2Fbadcoin", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Femersonmde%2Fbadcoin'... [INFO] [stderr] /workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Femersonmde%2Fbadcoin: No space left on device [WARN] Retrying crate fetch in 3 seconds (attempt 1) [INFO] cloning repository https://github.com/emersonmde/badcoin [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/emersonmde/badcoin" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Femersonmde%2Fbadcoin", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Femersonmde%2Fbadcoin'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] e21327ab8c1388d520bcf35d275a65e45cd977e9 [INFO] checking emersonmde/badcoin against master#ca77504943887037504c7fc0b9bf06dab3910373 for pr-145181 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Femersonmde%2Fbadcoin" "/workspace/builds/worker-7-tc1/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-7-tc1/source'... [INFO] [stderr] done. [INFO] started tweaking git repo https://github.com/emersonmde/badcoin [INFO] finished tweaking git repo https://github.com/emersonmde/badcoin [INFO] tweaked toml for git repo https://github.com/emersonmde/badcoin written to /workspace/builds/worker-7-tc1/source/Cargo.toml [INFO] validating manifest of git repo https://github.com/emersonmde/badcoin on toolchain ca77504943887037504c7fc0b9bf06dab3910373 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ca77504943887037504c7fc0b9bf06dab3910373" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate git repo https://github.com/emersonmde/badcoin already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ca77504943887037504c7fc0b9bf06dab3910373" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded secp256k1 v0.22.2 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ae6f63d130afcfff7f91f5ba9fdb2a74d52830289c6a2ea2d23a94dcfb480a0d" "/opt/rustwide/cargo-home/bin/cargo" "+ca77504943887037504c7fc0b9bf06dab3910373" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 888c89783e5a1ceb8a78e90169eb7806a7dcd9a50fbca589f0637e81c10f69e7 [INFO] running `Command { std: "docker" "start" "-a" "888c89783e5a1ceb8a78e90169eb7806a7dcd9a50fbca589f0637e81c10f69e7", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "888c89783e5a1ceb8a78e90169eb7806a7dcd9a50fbca589f0637e81c10f69e7", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "888c89783e5a1ceb8a78e90169eb7806a7dcd9a50fbca589f0637e81c10f69e7", kill_on_drop: false }` [INFO] [stdout] 888c89783e5a1ceb8a78e90169eb7806a7dcd9a50fbca589f0637e81c10f69e7 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ae6f63d130afcfff7f91f5ba9fdb2a74d52830289c6a2ea2d23a94dcfb480a0d" "/opt/rustwide/cargo-home/bin/cargo" "+ca77504943887037504c7fc0b9bf06dab3910373" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] a83a7f6d774d9c4982240e9cf65a69b1733f23fbdcb2bdc10f2ec61dddf0c9dd [INFO] running `Command { std: "docker" "start" "-a" "a83a7f6d774d9c4982240e9cf65a69b1733f23fbdcb2bdc10f2ec61dddf0c9dd", kill_on_drop: false }` [INFO] [stderr] Checking rand_core v0.4.2 [INFO] [stderr] Compiling autocfg v0.1.7 [INFO] [stderr] Compiling libc v0.2.66 [INFO] [stderr] Compiling autocfg v1.0.0 [INFO] [stderr] Compiling typenum v1.11.2 [INFO] [stderr] Compiling cc v1.0.41 [INFO] [stderr] Compiling byteorder v1.3.4 [INFO] [stderr] Compiling serde v1.0.104 [INFO] [stderr] Checking byte-tools v0.3.1 [INFO] [stderr] Checking fake-simd v0.1.2 [INFO] [stderr] Checking opaque-debug v0.2.3 [INFO] [stderr] Checking hex v0.4.0 [INFO] [stderr] Checking block-padding v0.1.5 [INFO] [stderr] Checking rand_core v0.3.1 [INFO] [stderr] Checking rand_jitter v0.1.4 [INFO] [stderr] Checking rand_hc v0.1.0 [INFO] [stderr] Checking rand_xorshift v0.1.1 [INFO] [stderr] Checking rand_isaac v0.1.1 [INFO] [stderr] Compiling num-traits v0.2.11 [INFO] [stderr] Compiling num-integer v0.1.42 [INFO] [stderr] Compiling rand_chacha v0.1.1 [INFO] [stderr] Compiling rand_pcg v0.1.2 [INFO] [stderr] Compiling rand v0.6.5 [INFO] [stderr] Compiling secp256k1-sys v0.5.2 [INFO] [stderr] Checking generic-array v0.12.4 [INFO] [stderr] Checking digest v0.8.1 [INFO] [stderr] Checking block-buffer v0.7.3 [INFO] [stderr] Checking sha2 v0.8.1 [INFO] [stderr] Checking rand_os v0.1.3 [INFO] [stderr] Checking time v0.1.42 [INFO] [stderr] Checking chrono v0.4.10 [INFO] [stderr] Checking secp256k1 v0.22.2 [INFO] [stderr] Checking badcoin v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: use of deprecated type alias `secp256k1::Signature`: Use ecdsa::Signature instead. [INFO] [stdout] --> src/keypair.rs:4:59 [INFO] [stdout] | [INFO] [stdout] 4 | use secp256k1::{Secp256k1, SecretKey, PublicKey, Message, Signature}; [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `secp256k1::Signature`: Use ecdsa::Signature instead. [INFO] [stdout] --> src/keypair.rs:73:17 [INFO] [stdout] | [INFO] [stdout] 73 | let s = Signature::from_str(signature).expect("Unable to read Signature"); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `secp256k1::Signature`: Use ecdsa::Signature instead. [INFO] [stdout] --> src/keypair.rs:57:17 [INFO] [stdout] | [INFO] [stdout] 57 | let s = Signature::from_str(&signature).expect("Unable to read Signature"); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `secp256k1::Signature`: Use ecdsa::Signature instead. [INFO] [stdout] --> src/keypair.rs:4:59 [INFO] [stdout] | [INFO] [stdout] 4 | use secp256k1::{Secp256k1, SecretKey, PublicKey, Message, Signature}; [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `secp256k1::Signature`: Use ecdsa::Signature instead. [INFO] [stdout] --> src/keypair.rs:73:17 [INFO] [stdout] | [INFO] [stdout] 73 | let s = Signature::from_str(signature).expect("Unable to read Signature"); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated type alias `secp256k1::Signature`: Use ecdsa::Signature instead. [INFO] [stdout] --> src/keypair.rs:57:17 [INFO] [stdout] | [INFO] [stdout] 57 | let s = Signature::from_str(&signature).expect("Unable to read Signature"); [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated method `secp256k1::ecdsa::>::sign`: Use sign_ecdsa instead. [INFO] [stdout] --> src/keypair.rs:49:30 [INFO] [stdout] | [INFO] [stdout] 49 | let signature = secp.sign(&message_bytes, &self.secret_key); [INFO] [stdout] | ^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated method `secp256k1::ecdsa::>::verify`: Use verify_ecdsa instead [INFO] [stdout] --> src/keypair.rs:59:26 [INFO] [stdout] | [INFO] [stdout] 59 | None => secp.verify(&m, &s, &self.public_key).is_ok(), [INFO] [stdout] | ^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated method `secp256k1::ecdsa::>::verify`: Use verify_ecdsa instead [INFO] [stdout] --> src/keypair.rs:62:22 [INFO] [stdout] | [INFO] [stdout] 62 | secp.verify(&m, &s, &pk).is_ok() [INFO] [stdout] | ^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated method `secp256k1::ecdsa::>::sign`: Use sign_ecdsa instead. [INFO] [stdout] --> src/keypair.rs:49:30 [INFO] [stdout] | [INFO] [stdout] 49 | let signature = secp.sign(&message_bytes, &self.secret_key); [INFO] [stdout] | ^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated method `secp256k1::ecdsa::>::verify`: Use verify_ecdsa instead [INFO] [stdout] --> src/keypair.rs:74:14 [INFO] [stdout] | [INFO] [stdout] 74 | secp.verify(&m, &s, &k).is_ok() [INFO] [stdout] | ^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated method `secp256k1::ecdsa::>::verify`: Use verify_ecdsa instead [INFO] [stdout] --> src/keypair.rs:59:26 [INFO] [stdout] | [INFO] [stdout] 59 | None => secp.verify(&m, &s, &self.public_key).is_ok(), [INFO] [stdout] | ^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated method `secp256k1::ecdsa::>::verify`: Use verify_ecdsa instead [INFO] [stdout] --> src/keypair.rs:62:22 [INFO] [stdout] | [INFO] [stdout] 62 | secp.verify(&m, &s, &pk).is_ok() [INFO] [stdout] | ^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated method `secp256k1::ecdsa::>::verify`: Use verify_ecdsa instead [INFO] [stdout] --> src/keypair.rs:74:14 [INFO] [stdout] | [INFO] [stdout] 74 | secp.verify(&m, &s, &k).is_ok() [INFO] [stdout] | ^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 5.42s [INFO] running `Command { std: "docker" "inspect" "a83a7f6d774d9c4982240e9cf65a69b1733f23fbdcb2bdc10f2ec61dddf0c9dd", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "a83a7f6d774d9c4982240e9cf65a69b1733f23fbdcb2bdc10f2ec61dddf0c9dd", kill_on_drop: false }` [INFO] [stdout] a83a7f6d774d9c4982240e9cf65a69b1733f23fbdcb2bdc10f2ec61dddf0c9dd