[INFO] fetching crate v_authorization 0.5.1... [INFO] testing v_authorization-0.5.1 against try#b6ae10aa7319b7ebb6c7b3331dd71a9d6c9c5b4b for pr-145330-1 [INFO] extracting crate v_authorization 0.5.1 into /workspace/builds/worker-6-tc2/source [INFO] started tweaking crates.io crate v_authorization 0.5.1 [INFO] removed 0 missing tests [INFO] finished tweaking crates.io crate v_authorization 0.5.1 [INFO] tweaked toml for crates.io crate v_authorization 0.5.1 written to /workspace/builds/worker-6-tc2/source/Cargo.toml [INFO] validating manifest of crates.io crate v_authorization 0.5.1 on toolchain b6ae10aa7319b7ebb6c7b3331dd71a9d6c9c5b4b [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+b6ae10aa7319b7ebb6c7b3331dd71a9d6c9c5b4b" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate crates.io crate v_authorization 0.5.1 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+b6ae10aa7319b7ebb6c7b3331dd71a9d6c9c5b4b" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+b6ae10aa7319b7ebb6c7b3331dd71a9d6c9c5b4b" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 0b6bb4f616d718c19816644e8cfaac71df18a948001d142ad689bc6b9952e2ad [INFO] running `Command { std: "docker" "start" "-a" "0b6bb4f616d718c19816644e8cfaac71df18a948001d142ad689bc6b9952e2ad", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "0b6bb4f616d718c19816644e8cfaac71df18a948001d142ad689bc6b9952e2ad", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "0b6bb4f616d718c19816644e8cfaac71df18a948001d142ad689bc6b9952e2ad", kill_on_drop: false }` [INFO] [stdout] 0b6bb4f616d718c19816644e8cfaac71df18a948001d142ad689bc6b9952e2ad [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+b6ae10aa7319b7ebb6c7b3331dd71a9d6c9c5b4b" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 6dcfd556845d7f60d68740ae608a097be8ba480d037a236cb93b3aa4f1ed2ada [INFO] running `Command { std: "docker" "start" "-a" "6dcfd556845d7f60d68740ae608a097be8ba480d037a236cb93b3aa4f1ed2ada", kill_on_drop: false }` [INFO] [stderr] Compiling regex-syntax v0.8.5 [INFO] [stderr] Compiling serde v1.0.219 [INFO] [stderr] Compiling string-builder v0.2.0 [INFO] [stderr] Compiling chrono v0.4.41 [INFO] [stderr] Compiling regex-automata v0.4.9 [INFO] [stderr] Compiling regex v1.11.1 [INFO] [stderr] Compiling serde_json v1.0.140 [INFO] [stderr] Compiling parse-zoneinfo v0.3.1 [INFO] [stderr] Compiling chrono-tz v0.5.3 [INFO] [stderr] Compiling v_authorization v0.5.1 (/opt/rustwide/workdir) [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 17.59s [INFO] running `Command { std: "docker" "inspect" "6dcfd556845d7f60d68740ae608a097be8ba480d037a236cb93b3aa4f1ed2ada", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "6dcfd556845d7f60d68740ae608a097be8ba480d037a236cb93b3aa4f1ed2ada", kill_on_drop: false }` [INFO] [stdout] 6dcfd556845d7f60d68740ae608a097be8ba480d037a236cb93b3aa4f1ed2ada [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+b6ae10aa7319b7ebb6c7b3331dd71a9d6c9c5b4b" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] d040ede1ca150acfb9b05e3e8298c30bb6b88d81c5bb919004f2577265e7171c [INFO] running `Command { std: "docker" "start" "-a" "d040ede1ca150acfb9b05e3e8298c30bb6b88d81c5bb919004f2577265e7171c", kill_on_drop: false }` [INFO] [stderr] Compiling v_authorization v0.5.1 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused variable: `original_filters` [INFO] [stdout] --> tests/common/mod.rs:189:13 [INFO] [stdout] | [INFO] [stdout] 189 | let original_filters = self.filters.clone(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `original_filters` [INFO] [stdout] --> tests/common/mod.rs:189:13 [INFO] [stdout] | [INFO] [stdout] 189 | let original_filters = self.filters.clone(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `original_filters` [INFO] [stdout] --> tests/common/mod.rs:189:13 [INFO] [stdout] | [INFO] [stdout] 189 | let original_filters = self.filters.clone(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `filter_resource` is never read [INFO] [stdout] --> tests/common/mod.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 27 | pub struct PermissionFilter { [INFO] [stdout] | ---------------- field in this struct [INFO] [stdout] 28 | pub resource: String, [INFO] [stdout] 29 | pub filter_resource: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used [INFO] [stdout] --> tests/common/mod.rs:44:12 [INFO] [stdout] | [INFO] [stdout] 34 | impl MockStorage { [INFO] [stdout] | ---------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 44 | pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 55 | pub fn delete_permission_filter(&mut self, filter_id: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 62 | pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 90 | pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `filter_resource` is never read [INFO] [stdout] --> tests/common/mod.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 27 | pub struct PermissionFilter { [INFO] [stdout] | ---------------- field in this struct [INFO] [stdout] 28 | pub resource: String, [INFO] [stdout] 29 | pub filter_resource: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `filter_resource` is never read [INFO] [stdout] --> tests/common/mod.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 27 | pub struct PermissionFilter { [INFO] [stdout] | ---------------- field in this struct [INFO] [stdout] 28 | pub resource: String, [INFO] [stdout] 29 | pub filter_resource: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used [INFO] [stdout] --> tests/common/mod.rs:44:12 [INFO] [stdout] | [INFO] [stdout] 34 | impl MockStorage { [INFO] [stdout] | ---------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 44 | pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 55 | pub fn delete_permission_filter(&mut self, filter_id: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 62 | pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 90 | pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `original_filters` [INFO] [stdout] --> tests/common/mod.rs:189:13 [INFO] [stdout] | [INFO] [stdout] 189 | let original_filters = self.filters.clone(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `group` [INFO] [stdout] --> tests/authorize_obj_group_tests.rs:185:16 [INFO] [stdout] | [INFO] [stdout] 185 | let (_acl, group, _info, mut trace) = create_test_trace(); [INFO] [stdout] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_group` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `original_filters` [INFO] [stdout] --> tests/common/mod.rs:189:13 [INFO] [stdout] | [INFO] [stdout] 189 | let original_filters = self.filters.clone(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `storage` [INFO] [stdout] --> tests/authorize_obj_group_tests.rs:345:13 [INFO] [stdout] | [INFO] [stdout] 345 | let mut storage = MockStorage::new(); [INFO] [stdout] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_storage` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> tests/authorize_obj_group_tests.rs:345:9 [INFO] [stdout] | [INFO] [stdout] 345 | let mut storage = MockStorage::new(); [INFO] [stdout] | ----^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `info` [INFO] [stdout] --> tests/authorize_obj_group_tests.rs:551:24 [INFO] [stdout] | [INFO] [stdout] 551 | let (_acl, _group, info, mut trace) = create_test_trace(); [INFO] [stdout] | ^^^^ help: if this is intentional, prefix it with an underscore: `_info` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `acl` [INFO] [stdout] --> tests/authorize_obj_group_tests.rs:601:10 [INFO] [stdout] | [INFO] [stdout] 601 | let (acl, _group, _info, mut trace) = create_test_trace(); [INFO] [stdout] | ^^^ help: if this is intentional, prefix it with an underscore: `_acl` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `info` [INFO] [stdout] --> tests/authorize_obj_group_tests.rs:831:24 [INFO] [stdout] | [INFO] [stdout] 831 | let (_acl, _group, info, mut trace) = create_test_trace(); [INFO] [stdout] | ^^^^ help: if this is intentional, prefix it with an underscore: `_info` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `filter_resource` is never read [INFO] [stdout] --> tests/common/mod.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 27 | pub struct PermissionFilter { [INFO] [stdout] | ---------------- field in this struct [INFO] [stdout] 28 | pub resource: String, [INFO] [stdout] 29 | pub filter_resource: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used [INFO] [stdout] --> tests/common/mod.rs:44:12 [INFO] [stdout] | [INFO] [stdout] 34 | impl MockStorage { [INFO] [stdout] | ---------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 44 | pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 55 | pub fn delete_permission_filter(&mut self, filter_id: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 62 | pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 90 | pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `filter_resource` is never read [INFO] [stdout] --> tests/common/mod.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 27 | pub struct PermissionFilter { [INFO] [stdout] | ---------------- field in this struct [INFO] [stdout] 28 | pub resource: String, [INFO] [stdout] 29 | pub filter_resource: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used [INFO] [stdout] --> tests/common/mod.rs:44:12 [INFO] [stdout] | [INFO] [stdout] 34 | impl MockStorage { [INFO] [stdout] | ---------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 44 | pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 55 | pub fn delete_permission_filter(&mut self, filter_id: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 62 | pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 90 | pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `original_filters` [INFO] [stdout] --> tests/common/mod.rs:189:13 [INFO] [stdout] | [INFO] [stdout] 189 | let original_filters = self.filters.clone(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `filter_resource` is never read [INFO] [stdout] --> tests/common/mod.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 27 | pub struct PermissionFilter { [INFO] [stdout] | ---------------- field in this struct [INFO] [stdout] 28 | pub resource: String, [INFO] [stdout] 29 | pub filter_resource: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used [INFO] [stdout] --> tests/common/mod.rs:44:12 [INFO] [stdout] | [INFO] [stdout] 34 | impl MockStorage { [INFO] [stdout] | ---------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 44 | pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 55 | pub fn delete_permission_filter(&mut self, filter_id: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 62 | pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 90 | pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `original_filters` [INFO] [stdout] --> tests/common/mod.rs:189:13 [INFO] [stdout] | [INFO] [stdout] 189 | let original_filters = self.filters.clone(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `filter_resource` is never read [INFO] [stdout] --> tests/common/mod.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 27 | pub struct PermissionFilter { [INFO] [stdout] | ---------------- field in this struct [INFO] [stdout] 28 | pub resource: String, [INFO] [stdout] 29 | pub filter_resource: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used [INFO] [stdout] --> tests/common/mod.rs:44:12 [INFO] [stdout] | [INFO] [stdout] 34 | impl MockStorage { [INFO] [stdout] | ---------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 44 | pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 55 | pub fn delete_permission_filter(&mut self, filter_id: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 62 | pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 90 | pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `CREATE` [INFO] [stdout] --> tests/permission_filters.rs:11:41 [INFO] [stdout] | [INFO] [stdout] 11 | use common::{MockStorage, READ, UPDATE, CREATE, DELETE, FULL_ACCESS}; [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `original_filters` [INFO] [stdout] --> tests/common/mod.rs:189:13 [INFO] [stdout] | [INFO] [stdout] 189 | let original_filters = self.filters.clone(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `original_filters` [INFO] [stdout] --> tests/common/mod.rs:189:13 [INFO] [stdout] | [INFO] [stdout] 189 | let original_filters = self.filters.clone(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `admin` [INFO] [stdout] --> tests/permission_filters.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 22 | let admin = MockStorage::get_admin_ticket(); [INFO] [stdout] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_admin` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `filter_resource` is never read [INFO] [stdout] --> tests/common/mod.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 27 | pub struct PermissionFilter { [INFO] [stdout] | ---------------- field in this struct [INFO] [stdout] 28 | pub resource: String, [INFO] [stdout] 29 | pub filter_resource: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `delete_permission` is never used [INFO] [stdout] --> tests/common/mod.rs:90:12 [INFO] [stdout] | [INFO] [stdout] 34 | impl MockStorage { [INFO] [stdout] | ---------------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 90 | pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `filter_resource` is never read [INFO] [stdout] --> tests/common/mod.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 27 | pub struct PermissionFilter { [INFO] [stdout] | ---------------- field in this struct [INFO] [stdout] 28 | pub resource: String, [INFO] [stdout] 29 | pub filter_resource: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used [INFO] [stdout] --> tests/common/mod.rs:44:12 [INFO] [stdout] | [INFO] [stdout] 34 | impl MockStorage { [INFO] [stdout] | ---------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 44 | pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 55 | pub fn delete_permission_filter(&mut self, filter_id: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 62 | pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 90 | pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `original_filters` [INFO] [stdout] --> tests/common/mod.rs:189:13 [INFO] [stdout] | [INFO] [stdout] 189 | let original_filters = self.filters.clone(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `filter_resource` is never read [INFO] [stdout] --> tests/common/mod.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 27 | pub struct PermissionFilter { [INFO] [stdout] | ---------------- field in this struct [INFO] [stdout] 28 | pub resource: String, [INFO] [stdout] 29 | pub filter_resource: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used [INFO] [stdout] --> tests/common/mod.rs:44:12 [INFO] [stdout] | [INFO] [stdout] 34 | impl MockStorage { [INFO] [stdout] | ---------------- methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 44 | pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 55 | pub fn delete_permission_filter(&mut self, filter_id: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 62 | pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 90 | pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 3.73s [INFO] running `Command { std: "docker" "inspect" "d040ede1ca150acfb9b05e3e8298c30bb6b88d81c5bb919004f2577265e7171c", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "d040ede1ca150acfb9b05e3e8298c30bb6b88d81c5bb919004f2577265e7171c", kill_on_drop: false }` [INFO] [stdout] d040ede1ca150acfb9b05e3e8298c30bb6b88d81c5bb919004f2577265e7171c [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+b6ae10aa7319b7ebb6c7b3331dd71a9d6c9c5b4b" "test" "--frozen", kill_on_drop: false }` [INFO] [stdout] 0c7abb2e0e11dd5d86ac1ecd917ad85077a8ffc4e5a5c045d703262170231cb8 [INFO] running `Command { std: "docker" "start" "-a" "0c7abb2e0e11dd5d86ac1ecd917ad85077a8ffc4e5a5c045d703262170231cb8", kill_on_drop: false }` [INFO] [stderr] warning: unused variable: `original_filters` [INFO] [stderr] --> tests/common/mod.rs:189:13 [INFO] [stderr] | [INFO] [stderr] 189 | let original_filters = self.filters.clone(); [INFO] [stderr] | ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_filters` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` on by default [INFO] [stderr] [INFO] [stderr] warning: field `filter_resource` is never read [INFO] [stderr] --> tests/common/mod.rs:29:9 [INFO] [stderr] | [INFO] [stderr] 27 | pub struct PermissionFilter { [INFO] [stderr] | ---------------- field in this struct [INFO] [stderr] 28 | pub resource: String, [INFO] [stderr] 29 | pub filter_resource: String, [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `PermissionFilter` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stderr] = note: `#[warn(dead_code)]` on by default [INFO] [stderr] [INFO] [stderr] warning: methods `add_permission_filter`, `delete_permission_filter`, `add_right_with_filter`, and `delete_permission` are never used [INFO] [stderr] --> tests/common/mod.rs:44:12 [INFO] [stderr] | [INFO] [stderr] 34 | impl MockStorage { [INFO] [stderr] | ---------------- methods in this implementation [INFO] [stderr] ... [INFO] [stderr] 44 | pub fn add_permission_filter(&mut self, filter_id: &str, resource: &str, filter_resource: &str, allowed_rights: u8) { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] ... [INFO] [stderr] 55 | pub fn delete_permission_filter(&mut self, filter_id: &str) { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] ... [INFO] [stderr] 62 | pub fn add_right_with_filter(&mut self, subject_uri: &str, object_uri: &str, rights: u8, filter_resource: Option<&str>) { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] ... [INFO] [stderr] 90 | pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused import: `CREATE` [INFO] [stderr] --> tests/permission_filters.rs:11:41 [INFO] [stderr] | [INFO] [stderr] 11 | use common::{MockStorage, READ, UPDATE, CREATE, DELETE, FULL_ACCESS}; [INFO] [stderr] | ^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_imports)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unused variable: `admin` [INFO] [stderr] --> tests/permission_filters.rs:22:9 [INFO] [stderr] | [INFO] [stderr] 22 | let admin = MockStorage::get_admin_ticket(); [INFO] [stderr] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_admin` [INFO] [stderr] [INFO] [stderr] warning: method `delete_permission` is never used [INFO] [stderr] --> tests/common/mod.rs:90:12 [INFO] [stderr] | [INFO] [stderr] 34 | impl MockStorage { [INFO] [stderr] | ---------------- method in this implementation [INFO] [stderr] ... [INFO] [stderr] 90 | pub fn delete_permission(&mut self, subject_uri: &str, object_uri: &str) { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: `v_authorization` (test "integration_scenarios") generated 2 warnings [INFO] [stderr] warning: `v_authorization` (test "edge_cases") generated 3 warnings (2 duplicates) [INFO] [stderr] warning: `v_authorization` (test "prepare_obj_group_tests") generated 3 warnings (3 duplicates) [INFO] [stderr] warning: `v_authorization` (test "advanced_patterns") generated 3 warnings (3 duplicates) [INFO] [stderr] warning: `v_authorization` (test "specialized_authorization") generated 3 warnings (3 duplicates) [INFO] [stderr] warning: `v_authorization` (test "core_authorization") generated 3 warnings (3 duplicates) [INFO] [stderr] warning: `v_authorization` (test "group_management") generated 3 warnings (3 duplicates) [INFO] [stderr] warning: `v_authorization` (test "permission_filters") generated 5 warnings (2 duplicates) (run `cargo fix --test "permission_filters"` to apply 1 suggestion) [INFO] [stderr] warning: unused variable: `group` [INFO] [stderr] --> tests/authorize_obj_group_tests.rs:185:16 [INFO] [stderr] | [INFO] [stderr] 185 | let (_acl, group, _info, mut trace) = create_test_trace(); [INFO] [stderr] | ^^^^^ help: if this is intentional, prefix it with an underscore: `_group` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `storage` [INFO] [stderr] --> tests/authorize_obj_group_tests.rs:345:13 [INFO] [stderr] | [INFO] [stderr] 345 | let mut storage = MockStorage::new(); [INFO] [stderr] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_storage` [INFO] [stderr] [INFO] [stderr] warning: variable does not need to be mutable [INFO] [stderr] --> tests/authorize_obj_group_tests.rs:345:9 [INFO] [stderr] | [INFO] [stderr] 345 | let mut storage = MockStorage::new(); [INFO] [stderr] | ----^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | help: remove this `mut` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_mut)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unused variable: `info` [INFO] [stderr] --> tests/authorize_obj_group_tests.rs:551:24 [INFO] [stderr] | [INFO] [stderr] 551 | let (_acl, _group, info, mut trace) = create_test_trace(); [INFO] [stderr] | ^^^^ help: if this is intentional, prefix it with an underscore: `_info` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `acl` [INFO] [stderr] --> tests/authorize_obj_group_tests.rs:601:10 [INFO] [stderr] | [INFO] [stderr] 601 | let (acl, _group, _info, mut trace) = create_test_trace(); [INFO] [stderr] | ^^^ help: if this is intentional, prefix it with an underscore: `_acl` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `info` [INFO] [stderr] --> tests/authorize_obj_group_tests.rs:831:24 [INFO] [stderr] | [INFO] [stderr] 831 | let (_acl, _group, info, mut trace) = create_test_trace(); [INFO] [stderr] | ^^^^ help: if this is intentional, prefix it with an underscore: `_info` [INFO] [stderr] [INFO] [stderr] warning: `v_authorization` (test "authorization_patterns") generated 3 warnings (3 duplicates) [INFO] [stderr] warning: `v_authorization` (test "authorize_obj_group_tests") generated 9 warnings (3 duplicates) (run `cargo fix --test "authorize_obj_group_tests"` to apply 1 suggestion) [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 0.10s [INFO] [stderr] Running unittests src/authorization.rs (/opt/rustwide/target/debug/deps/v_authorization-e015c9e155469445) [INFO] [stdout] [INFO] [stdout] running 44 tests [INFO] [stdout] test common::tests::test_access_constants ... ok [INFO] [stdout] test common::tests::test_access_to_pretty_string ... ok [INFO] [stdout] test common::tests::test_acl_record_creation ... ok [INFO] [stdout] test common::tests::test_exclusive_markers ... ok [INFO] [stdout] test common::tests::test_get_path ... ok [INFO] [stdout] test common::tests::test_trace_functions ... ok [INFO] [stdout] test common::tests::test_acl_record_debug ... ok [INFO] [stdout] test tests::test_acl_record_counters_edge_cases ... ok [INFO] [stdout] test tests::test_acl_record_debug ... ok [INFO] [stdout] test tests::test_acl_record_new_with_access ... ok [INFO] [stdout] test tests::test_acl_record_new_with_zero_access ... ok [INFO] [stdout] test tests::test_acl_record_new_with_max_access ... ok [INFO] [stdout] test tests::test_acl_record_with_deletion ... ok [INFO] [stdout] test tests::test_acl_record_with_ignore_exclusive_marker ... ok [INFO] [stdout] test tests::test_acl_record_with_exclusive_marker ... ok [INFO] [stdout] test tests::test_acl_record_with_level ... ok [INFO] [stdout] test trace::tests::test_add_found_group ... ok [INFO] [stdout] test trace::tests::test_add_found_group_disabled ... ok [INFO] [stdout] test trace::tests::test_add_group_object ... ok [INFO] [stdout] test trace::tests::test_add_group_subject ... ok [INFO] [stdout] test trace::tests::test_add_group_disabled ... ok [INFO] [stdout] test trace::tests::test_add_info ... ok [INFO] [stdout] test trace::tests::test_add_info_disabled ... ok [INFO] [stdout] test trace::tests::test_add_permission_disabled ... ok [INFO] [stdout] test trace::tests::test_finalize_disabled ... ok [INFO] [stdout] test trace::tests::test_finalize_enabled ... ok [INFO] [stdout] test trace::tests::test_add_permission ... ok [INFO] [stdout] test trace::tests::test_nested_steps ... ok [INFO] [stdout] test trace::tests::test_rights_to_string ... ok [INFO] [stdout] test trace::tests::test_start_and_end_step_disabled ... ok [INFO] [stdout] test trace::tests::test_complex_trace_scenario ... ok [INFO] [stdout] test trace::tests::test_start_and_end_step ... ok [INFO] [stdout] test trace::tests::test_trace_info_new_enabled ... ok [INFO] [stdout] test trace::tests::test_trace_info_new_disabled ... ok [INFO] [stdout] test trace::tests::test_trace_info_new_detailed ... ok [INFO] [stdout] test trace::tests::test_trace_info_with_details_disabled ... ok [INFO] [stdout] test trace::tests::test_trace_info_with_details ... ok [INFO] [stdout] test trace::tests::test_update_step_rights ... ok [INFO] [stdout] test trace::tests::test_trace_mode_enum ... ok [INFO] [stdout] test tests::test_acl_record_with_counters_overlapping_rights ... ok [INFO] [stdout] test common::tests::test_prefixes ... ok [INFO] [stdout] test trace::tests::test_update_step_rights_disabled ... ok [INFO] [stdout] test tests::test_acl_record_new ... ok [INFO] [stdout] test common::tests::test_get_path_empty ... ok [INFO] [stderr] Running tests/advanced_patterns.rs (/opt/rustwide/target/debug/deps/advanced_patterns-c4fc6c6735ad1b9a) [INFO] [stdout] [INFO] [stdout] test result: ok. 44 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.02s [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] running 5 tests [INFO] [stdout] test test_cascading_permissions_pattern ... ok [INFO] [stdout] test test_resource_hierarchy_pattern ... ok [INFO] [stdout] test test_conditional_access_pattern ... ok [INFO] [stdout] test test_temporal_access_pattern ... ok [INFO] [stdout] test test_delegation_pattern ... ok [INFO] [stdout] [INFO] [stdout] test result: ok. 5 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.01s [INFO] [stdout] [INFO] [stderr] Running tests/authorization_patterns.rs (/opt/rustwide/target/debug/deps/authorization_patterns-86cfe0ad6c20672a) [INFO] [stdout] [INFO] [stdout] running 4 tests [INFO] [stdout] test test_can_update_property_pattern ... ok [INFO] [stderr] Running tests/authorize_obj_group_tests.rs (/opt/rustwide/target/debug/deps/authorize_obj_group_tests-4d1092c0acfb215a) [INFO] [stdout] test test_permission_subject_pattern ... ok [INFO] [stdout] test test_group_membership_management ... ok [INFO] [stdout] test test_multi_level_authorization_with_restrictions ... ok [INFO] [stdout] [INFO] [stdout] test result: ok. 4 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] running 16 tests [INFO] [stdout] test test_authorize_obj_group_access_restrictions ... ok [INFO] [stdout] test test_authorize_obj_group_acl_tracing ... ok [INFO] [stdout] test test_authorize_obj_group_basic_permission_match ... ok [INFO] [stdout] test test_authorize_obj_group_complex_permission_calculation ... ok [INFO] [stdout] test test_authorize_obj_group_database_error ... ok [INFO] [stdout] test test_authorize_obj_group_final_check_with_calc_rights ... ok [INFO] [stdout] test test_authorize_obj_group_info_tracing ... ok [INFO] [stdout] test test_authorize_obj_group_no_permissions_data ... ok [INFO] [stdout] test test_authorize_obj_group_multiple_permissions_cumulative ... ok [INFO] [stdout] test test_authorize_obj_group_no_subject_match ... ok [INFO] [stdout] test test_authorize_obj_group_with_filter ... ok [INFO] [stdout] test test_authorize_obj_group_with_filter_tracing ... ok [INFO] [stdout] test test_authorize_obj_group_with_group_tracing ... ok [INFO] [stdout] test test_authorize_obj_group_optimization_already_checked_group ... ok [INFO] [stdout] test test_authorize_obj_group_optimization_left_to_check_covered ... ok [INFO] [stdout] test test_authorize_obj_group_early_return_full_access ... ok [INFO] [stdout] [INFO] [stdout] test result: ok. 16 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.01s [INFO] [stdout] [INFO] [stderr] Running tests/core_authorization.rs (/opt/rustwide/target/debug/deps/core_authorization-7974ce735108f852) [INFO] [stdout] [INFO] [stdout] running 7 tests [INFO] [stdout] test test_combined_permissions ... ok [INFO] [stdout] test test_no_permissions ... ok [INFO] [stdout] test test_direct_permission_deny ... ok [INFO] [stdout] test test_direct_permission_allow ... ok [INFO] [stdout] test test_group_based_permission ... ok [INFO] [stdout] test test_hierarchical_groups ... ok [INFO] [stdout] test test_object_groups ... ok [INFO] [stdout] [INFO] [stdout] test result: ok. 7 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] [stderr] Running tests/edge_cases.rs (/opt/rustwide/target/debug/deps/edge_cases-fc4ca5d32ffe9b75) [INFO] [stdout] [INFO] [stdout] running 9 tests [INFO] [stdout] test test_mixed_case_sensitivity ... ok [INFO] [stdout] test test_maximum_access_bits ... ok [INFO] [stdout] test test_special_characters_in_ids ... ok [INFO] [stdout] test test_zero_access_permissions ... ok [INFO] [stdout] test test_malformed_data_handling ... ok [INFO] [stdout] test test_very_long_ids ... ok [INFO] [stdout] test test_whitespace_in_ids ... ok [INFO] [stdout] test test_large_permission_sets ... ok [INFO] [stdout] test test_unicode_ids ... ok [INFO] [stdout] [INFO] [stdout] test result: ok. 9 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.01s [INFO] [stdout] [INFO] [stderr] Running tests/group_management.rs (/opt/rustwide/target/debug/deps/group_management-7af1a746be7d9668) [INFO] [stdout] [INFO] [stdout] running 2 tests [INFO] [stdout] test test_complex_group_restrictions ... ok [INFO] [stdout] test test_multiple_group_paths ... ok [INFO] [stdout] [INFO] [stdout] test result: ok. 2 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] running 7 tests [INFO] [stderr] Running tests/integration_scenarios.rs (/opt/rustwide/target/debug/deps/integration_scenarios-631e187f3e7b0c8c) [INFO] [stdout] test test_cyclic_groups_scenario ... ok [INFO] [stdout] test test_basic_group_authorization_workflow ... ok [INFO] [stdout] test test_group_membership_with_access_levels_scenario ... ok [INFO] [stdout] test test_individual_as_group_scenario ... ok [INFO] [stdout] test test_permission_filters_complete_scenario ... ok [INFO] [stdout] test test_range_query_patterns ... ok [INFO] [stdout] test test_nested_groups_with_restrictions_scenario ... ok [INFO] [stdout] [INFO] [stdout] test result: ok. 7 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] [stderr] Running tests/permission_filters.rs (/opt/rustwide/target/debug/deps/permission_filters-7255529967b506cf) [INFO] [stdout] [INFO] [stdout] running 4 tests [INFO] [stdout] test test_multiple_permission_filters ... ok [INFO] [stdout] test test_permission_filter_with_trace ... ok [INFO] [stdout] test test_permission_filter_lifecycle ... ok [INFO] [stderr] Running tests/prepare_obj_group_tests.rs (/opt/rustwide/target/debug/deps/prepare_obj_group_tests-42e9bec0b826e454) [INFO] [stdout] test test_permission_filters_various_rights ... ok [INFO] [stdout] [INFO] [stdout] test result: ok. 4 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Running tests/specialized_authorization.rs (/opt/rustwide/target/debug/deps/specialized_authorization-07d166d745ef3c13) [INFO] [stdout] running 13 tests [INFO] [stdout] test test_prepare_obj_group_access_masking ... ok [INFO] [stdout] test test_prepare_obj_group_database_error ... ok [INFO] [stdout] test test_prepare_obj_group_deep_recursion ... ok [INFO] [stdout] test test_prepare_obj_group_exclusive_authorization_flow ... ok [INFO] [stdout] test test_prepare_obj_group_empty_groups_set ... ok [INFO] [stdout] test test_prepare_obj_group_already_walked_groups ... ok [INFO] [stdout] test test_prepare_obj_group_self_reference_skip ... ok [INFO] [stdout] test test_prepare_obj_group_skip_exclusive_marker_groups ... ok [INFO] [stdout] test test_prepare_obj_group_suffix_group_detection ... ok [INFO] [stdout] test test_prepare_obj_group_exclusive_marker_in_subject_groups ... ok [INFO] [stdout] test test_prepare_obj_group_no_membership_data ... ok [INFO] [stdout] test test_prepare_obj_group_ttl_resources_group ... ok [INFO] [stdout] test test_prepare_obj_group_with_tracing ... ok [INFO] [stdout] [INFO] [stdout] test result: ok. 13 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] running 7 tests [INFO] [stdout] test test_ignore_exclusive_patterns ... ok [INFO] [stdout] test test_combined_authorization_patterns ... ok [INFO] [stdout] test test_membership_exclusive_patterns ... ok [INFO] [stdout] test test_permission_filter_patterns ... ok [INFO] [stdout] test test_script_execution_patterns ... ok [INFO] [stdout] test test_module_waiting_patterns ... ok [INFO] [stderr] Doc-tests v_authorization [INFO] [stdout] test test_resource_type_patterns ... ok [INFO] [stdout] [INFO] [stdout] test result: ok. 7 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "0c7abb2e0e11dd5d86ac1ecd917ad85077a8ffc4e5a5c045d703262170231cb8", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "0c7abb2e0e11dd5d86ac1ecd917ad85077a8ffc4e5a5c045d703262170231cb8", kill_on_drop: false }` [INFO] [stdout] 0c7abb2e0e11dd5d86ac1ecd917ad85077a8ffc4e5a5c045d703262170231cb8