[INFO] fetching crate pi_crypto 0.1.1... [INFO] checking pi_crypto-0.1.1 against master#8c32e313cccf7df531e2d49ffb8227bb92304aee for pr-145608-1 [INFO] extracting crate pi_crypto 0.1.1 into /workspace/builds/worker-5-tc1/source [INFO] started tweaking crates.io crate pi_crypto 0.1.1 [INFO] removed 0 missing tests [INFO] finished tweaking crates.io crate pi_crypto 0.1.1 [INFO] tweaked toml for crates.io crate pi_crypto 0.1.1 written to /workspace/builds/worker-5-tc1/source/Cargo.toml [INFO] validating manifest of crates.io crate pi_crypto 0.1.1 on toolchain 8c32e313cccf7df531e2d49ffb8227bb92304aee [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+8c32e313cccf7df531e2d49ffb8227bb92304aee" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate crates.io crate pi_crypto 0.1.1 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+8c32e313cccf7df531e2d49ffb8227bb92304aee" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded pi_hash_value v0.1.0 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:7ad1b28ee6f5f7f699f6cf7015098d6ccdd96d6f2d78dd06228f5b4c9faf309c" "/opt/rustwide/cargo-home/bin/cargo" "+8c32e313cccf7df531e2d49ffb8227bb92304aee" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 3a39383870afb3783e2c0d98daab44801310a459d710b29c3c14deabcd89daa3 [INFO] running `Command { std: "docker" "start" "-a" "3a39383870afb3783e2c0d98daab44801310a459d710b29c3c14deabcd89daa3", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "3a39383870afb3783e2c0d98daab44801310a459d710b29c3c14deabcd89daa3", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "3a39383870afb3783e2c0d98daab44801310a459d710b29c3c14deabcd89daa3", kill_on_drop: false }` [INFO] [stdout] 3a39383870afb3783e2c0d98daab44801310a459d710b29c3c14deabcd89daa3 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:7ad1b28ee6f5f7f699f6cf7015098d6ccdd96d6f2d78dd06228f5b4c9faf309c" "/opt/rustwide/cargo-home/bin/cargo" "+8c32e313cccf7df531e2d49ffb8227bb92304aee" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] edaa6b9f3762cd411903021f5e5913df9f8e1ac5e659c246e880d4de3cc31a9e [INFO] running `Command { std: "docker" "start" "-a" "edaa6b9f3762cd411903021f5e5913df9f8e1ac5e659c246e880d4de3cc31a9e", kill_on_drop: false }` [INFO] [stderr] Checking subtle v2.6.1 [INFO] [stderr] Compiling zerocopy v0.8.24 [INFO] [stderr] Checking base64ct v1.7.3 [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Compiling crunchy v0.2.3 [INFO] [stderr] Compiling cc v1.2.17 [INFO] [stderr] Compiling num-bigint v0.2.6 [INFO] [stderr] Checking iana-time-zone v0.1.62 [INFO] [stderr] Checking getrandom v0.1.16 [INFO] [stderr] Compiling digest v0.9.0 [INFO] [stderr] Compiling syn v2.0.100 [INFO] [stderr] Compiling gcc v0.3.55 [INFO] [stderr] Checking cipher v0.4.4 [INFO] [stderr] Checking rand v0.4.6 [INFO] [stderr] Checking base64 v0.12.3 [INFO] [stderr] Compiling libsecp256k1-core v0.2.2 [INFO] [stderr] Checking rand_core v0.5.1 [INFO] [stderr] Checking smallvec v1.14.0 [INFO] [stderr] Checking sha2 v0.9.9 [INFO] [stderr] Checking crypto-bigint v0.3.2 [INFO] [stderr] Checking crypto-mac v0.8.0 [INFO] [stderr] Checking pem-rfc7468 v0.3.1 [INFO] [stderr] Checking hmac v0.8.1 [INFO] [stderr] Checking pem v0.8.3 [INFO] [stderr] Checking digest v0.10.7 [INFO] [stderr] Checking time v0.1.45 [INFO] [stderr] Checking cbc v0.1.2 [INFO] [stderr] Checking aes v0.8.4 [INFO] [stderr] Checking pi_hash_value v0.1.0 [INFO] [stderr] Checking hmac-drbg v0.3.0 [INFO] [stderr] Checking rand v0.3.23 [INFO] [stderr] Compiling rust-crypto v0.2.36 [INFO] [stderr] Checking der v0.5.1 [INFO] [stderr] Compiling libsecp256k1-gen-genmult v0.2.1 [INFO] [stderr] Compiling libsecp256k1-gen-ecmult v0.2.1 [INFO] [stderr] Checking num-integer v0.1.46 [INFO] [stderr] Checking chrono v0.4.40 [INFO] [stderr] Compiling ring v0.16.20 [INFO] [stderr] Compiling libsecp256k1 v0.6.0 [INFO] [stderr] Checking num-iter v0.1.45 [INFO] [stderr] Checking spki v0.5.4 [INFO] [stderr] Checking pkcs8 v0.8.0 [INFO] [stderr] Checking pkcs1 v0.3.3 [INFO] [stderr] Checking ppv-lite86 v0.2.21 [INFO] [stderr] Checking rand_chacha v0.3.1 [INFO] [stderr] Checking rand_chacha v0.2.2 [INFO] [stderr] Checking simple_asn1 v0.4.1 [INFO] [stderr] Checking rand v0.7.3 [INFO] [stderr] Checking rand v0.8.5 [INFO] [stderr] Checking num-bigint-dig v0.8.4 [INFO] [stderr] Compiling serde_derive v1.0.219 [INFO] [stderr] Checking rsa v0.6.1 [INFO] [stderr] Checking serde v1.0.219 [INFO] [stderr] Checking serde_json v1.0.140 [INFO] [stderr] Checking jsonwebtoken v7.2.0 [INFO] [stderr] Checking pi_crypto v0.1.1 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused import: `RsaPublicKeyComponents` [INFO] [stdout] --> src/signature.rs:5:53 [INFO] [stdout] | [INFO] [stdout] 5 | EcdsaKeyPair as EcKeyPair, KeyPair, RsaKeyPair, RsaPublicKeyComponents, ECDSA_P256_SHA256_ASN1, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `BlockEncryptMut` [INFO] [stdout] --> src/cbc.rs:1:58 [INFO] [stdout] | [INFO] [stdout] 1 | use aes::cipher::{block_padding::Pkcs7, BlockDecryptMut, BlockEncryptMut, KeyIvInit}; [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `RsaPublicKeyComponents` [INFO] [stdout] --> src/signature.rs:5:53 [INFO] [stdout] | [INFO] [stdout] 5 | EcdsaKeyPair as EcKeyPair, KeyPair, RsaKeyPair, RsaPublicKeyComponents, ECDSA_P256_SHA256_ASN1, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `BlockEncryptMut` [INFO] [stdout] --> src/cbc.rs:1:58 [INFO] [stdout] | [INFO] [stdout] 1 | use aes::cipher::{block_padding::Pkcs7, BlockDecryptMut, BlockEncryptMut, KeyIvInit}; [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/cbc.rs:17:9 [INFO] [stdout] | [INFO] [stdout] 17 | let mut key: [u8; 16] = key.try_into().map_err(|_| "key must be 16 bytes")?; [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0599]: no method named `public_key` found for enum `Result` in the current scope [INFO] [stdout] --> src/signature.rs:398:22 [INFO] [stdout] | [INFO] [stdout] 398 | let pk = rsa.public_key(); [INFO] [stdout] | ^^^^^^^^^^ method not found in `Result` [INFO] [stdout] | [INFO] [stdout] note: the method `public_key` exists on the type `signature::Rsa` [INFO] [stdout] --> src/signature.rs:112:5 [INFO] [stdout] | [INFO] [stdout] 112 | pub fn public_key(&self) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] help: consider using `Result::expect` to unwrap the `signature::Rsa` value, panicking if the value is a `Result::Err` [INFO] [stdout] | [INFO] [stdout] 398 | let pk = rsa.expect("REASON").public_key(); [INFO] [stdout] | +++++++++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0599]: no method named `sign` found for enum `Result` in the current scope [INFO] [stdout] --> src/signature.rs:399:23 [INFO] [stdout] | [INFO] [stdout] 399 | let sig = rsa.sign(PaddingAlg::RSA_PKCS1_SHA256, MESSAGE); [INFO] [stdout] | ^^^^ method not found in `Result` [INFO] [stdout] | [INFO] [stdout] note: the method `sign` exists on the type `signature::Rsa` [INFO] [stdout] --> src/signature.rs:120:5 [INFO] [stdout] | [INFO] [stdout] 120 | pub fn sign(&self, padAlg: PaddingAlg, msg: &[u8]) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] help: consider using `Result::expect` to unwrap the `signature::Rsa` value, panicking if the value is a `Result::Err` [INFO] [stdout] | [INFO] [stdout] 399 | let sig = rsa.expect("REASON").sign(PaddingAlg::RSA_PKCS1_SHA256, MESSAGE); [INFO] [stdout] | +++++++++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/cbc.rs:17:9 [INFO] [stdout] | [INFO] [stdout] 17 | let mut key: [u8; 16] = key.try_into().map_err(|_| "key must be 16 bytes")?; [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0599`. [INFO] [stdout] [INFO] [stderr] error: could not compile `pi_crypto` (lib test) due to 2 previous errors; 3 warnings emitted [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] running `Command { std: "docker" "inspect" "edaa6b9f3762cd411903021f5e5913df9f8e1ac5e659c246e880d4de3cc31a9e", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "edaa6b9f3762cd411903021f5e5913df9f8e1ac5e659c246e880d4de3cc31a9e", kill_on_drop: false }` [INFO] [stdout] edaa6b9f3762cd411903021f5e5913df9f8e1ac5e659c246e880d4de3cc31a9e