[INFO] fetching crate vulfy 0.1.0... [INFO] checking vulfy-0.1.0 against try#c659ee110de67e82444e4b6c8407c1a9af9c2cf6 for pr-145608-1 [INFO] extracting crate vulfy 0.1.0 into /workspace/builds/worker-5-tc2/source [INFO] started tweaking crates.io crate vulfy 0.1.0 [INFO] finished tweaking crates.io crate vulfy 0.1.0 [INFO] tweaked toml for crates.io crate vulfy 0.1.0 written to /workspace/builds/worker-5-tc2/source/Cargo.toml [INFO] validating manifest of crates.io crate vulfy 0.1.0 on toolchain c659ee110de67e82444e4b6c8407c1a9af9c2cf6 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c659ee110de67e82444e4b6c8407c1a9af9c2cf6" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate crates.io crate vulfy 0.1.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c659ee110de67e82444e4b6c8407c1a9af9c2cf6" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:7ad1b28ee6f5f7f699f6cf7015098d6ccdd96d6f2d78dd06228f5b4c9faf309c" "/opt/rustwide/cargo-home/bin/cargo" "+c659ee110de67e82444e4b6c8407c1a9af9c2cf6" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] b7afb564cadaf00cf8f1961c56f216f2bdacec2fe7c0371e4a9654ead1a8972b [INFO] running `Command { std: "docker" "start" "-a" "b7afb564cadaf00cf8f1961c56f216f2bdacec2fe7c0371e4a9654ead1a8972b", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "b7afb564cadaf00cf8f1961c56f216f2bdacec2fe7c0371e4a9654ead1a8972b", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "b7afb564cadaf00cf8f1961c56f216f2bdacec2fe7c0371e4a9654ead1a8972b", kill_on_drop: false }` [INFO] [stdout] b7afb564cadaf00cf8f1961c56f216f2bdacec2fe7c0371e4a9654ead1a8972b [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:7ad1b28ee6f5f7f699f6cf7015098d6ccdd96d6f2d78dd06228f5b4c9faf309c" "/opt/rustwide/cargo-home/bin/cargo" "+c659ee110de67e82444e4b6c8407c1a9af9c2cf6" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 5cccf7ac51af08f47239ddecf4fe6181a9c29bbdd23af0691ce51453f0432064 [INFO] running `Command { std: "docker" "start" "-a" "5cccf7ac51af08f47239ddecf4fe6181a9c29bbdd23af0691ce51453f0432064", kill_on_drop: false }` [INFO] [stderr] Compiling cc v1.2.27 [INFO] [stderr] Checking yoke v0.8.0 [INFO] [stderr] Checking parking_lot_core v0.9.11 [INFO] [stderr] Checking signal-hook-registry v1.4.5 [INFO] [stderr] Checking serde v1.0.219 [INFO] [stderr] Checking slab v0.4.10 [INFO] [stderr] Checking hashbrown v0.15.4 [INFO] [stderr] Checking tracing v0.1.41 [INFO] [stderr] Checking zerovec v0.11.2 [INFO] [stderr] Checking parking_lot v0.12.4 [INFO] [stderr] Checking zerotrie v0.2.2 [INFO] [stderr] Checking getrandom v0.3.3 [INFO] [stderr] Checking futures-util v0.3.31 [INFO] [stderr] Checking http-body v0.4.6 [INFO] [stderr] Checking tokio v1.45.1 [INFO] [stderr] Checking anstyle-query v1.1.3 [INFO] [stderr] Checking anstream v0.6.19 [INFO] [stderr] Checking regex-automata v0.4.9 [INFO] [stderr] Checking indexmap v2.9.0 [INFO] [stderr] Compiling syn v1.0.109 [INFO] [stderr] Checking tinystr v0.8.1 [INFO] [stderr] Checking potential_utf v0.1.2 [INFO] [stderr] Checking icu_collections v2.0.0 [INFO] [stderr] Checking icu_locale_core v2.0.0 [INFO] [stderr] Compiling tokio-cron-scheduler v0.10.2 [INFO] [stderr] Compiling rustix v1.0.7 [INFO] [stderr] Checking winnow v0.7.11 [INFO] [stderr] Compiling openssl-sys v0.9.109 [INFO] [stderr] Checking icu_provider v2.0.0 [INFO] [stderr] Compiling libz-sys v1.1.22 [INFO] [stderr] Checking icu_normalizer v2.0.0 [INFO] [stderr] Checking icu_properties v2.0.1 [INFO] [stderr] Compiling openssl v0.10.73 [INFO] [stderr] Compiling libssh2-sys v0.3.1 [INFO] [stderr] Compiling native-tls v0.2.14 [INFO] [stderr] Compiling libgit2-sys v0.16.2+1.7.2 [INFO] [stderr] Compiling clap_derive v4.5.40 [INFO] [stderr] Compiling num-derive v0.3.3 [INFO] [stderr] Checking serde_spanned v0.6.9 [INFO] [stderr] Checking toml_datetime v0.6.11 [INFO] [stderr] Checking chrono v0.4.41 [INFO] [stderr] Checking toml_edit v0.22.27 [INFO] [stderr] Checking idna_adapter v1.2.1 [INFO] [stderr] Checking idna v1.0.3 [INFO] [stderr] Checking url v2.5.4 [INFO] [stderr] Checking uuid v1.17.0 [INFO] [stderr] Checking serde_json v1.0.140 [INFO] [stderr] Checking serde_urlencoded v0.7.1 [INFO] [stderr] Checking cron v0.12.1 [INFO] [stderr] Checking clap_builder v4.5.40 [INFO] [stderr] Checking tokio-util v0.7.15 [INFO] [stderr] Checking futures-executor v0.3.31 [INFO] [stderr] Checking regex v1.11.1 [INFO] [stderr] Checking h2 v0.3.26 [INFO] [stderr] Checking rustls-pemfile v1.0.4 [INFO] [stderr] Compiling async-stream-impl v0.3.6 [INFO] [stderr] Checking sync_wrapper v0.1.2 [INFO] [stderr] Checking toml v0.8.23 [INFO] [stderr] Checking thiserror v1.0.69 [INFO] [stderr] Checking tracing-subscriber v0.3.19 [INFO] [stderr] Checking async-stream v0.3.6 [INFO] [stderr] Checking futures v0.3.31 [INFO] [stderr] Checking tokio-stream v0.1.17 [INFO] [stderr] Checking tokio-native-tls v0.3.1 [INFO] [stderr] Checking quick-xml v0.36.2 [INFO] [stderr] Checking tokio-test v0.4.4 [INFO] [stderr] Checking clap v4.5.40 [INFO] [stderr] Checking tempfile v3.20.0 [INFO] [stderr] Checking hyper v0.14.32 [INFO] [stderr] Checking hyper-tls v0.5.0 [INFO] [stderr] Checking reqwest v0.11.27 [INFO] [stderr] Checking git2 v0.18.3 [INFO] [stderr] Checking vulfy v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: variant `PackageParsing` is never constructed [INFO] [stdout] --> src/error.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 6 | pub enum VulfyError { [INFO] [stdout] | ---------- variant in this enum [INFO] [stdout] ... [INFO] [stdout] 29 | PackageParsing { message: String }, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `VulfyError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `scan_directory_recursive` and `scan_directory_flat` are never used [INFO] [stdout] --> src/scanner/mod.rs:284:14 [INFO] [stdout] | [INFO] [stdout] 97 | impl Scanner { [INFO] [stdout] | ------------ methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 284 | async fn scan_directory_recursive(&self, dir_path: &Path, _config: &ScanConfig) -> VulfyResult> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 315 | async fn scan_directory_flat(&self, dir_path: &Path) -> VulfyResult> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `matches` is never used [INFO] [stdout] --> src/automation/mod.rs:221:12 [INFO] [stdout] | [INFO] [stdout] 219 | impl ScanPolicy { [INFO] [stdout] | --------------- method in this implementation [INFO] [stdout] 220 | /// Check if a vulnerability matches this policy [INFO] [stdout] 221 | pub fn matches(&self, vulnerability: &Vulnerability) -> bool { [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `is_running` is never used [INFO] [stdout] --> src/automation/scheduler.rs:146:18 [INFO] [stdout] | [INFO] [stdout] 24 | impl AutomationScheduler { [INFO] [stdout] | ------------------------ method in this implementation [INFO] [stdout] ... [INFO] [stdout] 146 | pub async fn is_running(&self) -> bool { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `policy_name`, `vulnerability_id`, `package_name`, and `actions` are never read [INFO] [stdout] --> src/automation/policy.rs:13:9 [INFO] [stdout] | [INFO] [stdout] 12 | pub struct PolicyMatch { [INFO] [stdout] | ----------- fields in this struct [INFO] [stdout] 13 | pub policy_name: String, [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] 14 | pub vulnerability_id: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] 15 | pub package_name: String, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] 16 | pub actions: PolicyActions, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PolicyMatch` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `policy_matches`, `ignored_vulnerabilities`, and `prioritized_vulnerabilities` are never read [INFO] [stdout] --> src/automation/policy.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 20 | pub struct FilteredScanResult { [INFO] [stdout] | ------------------ fields in this struct [INFO] [stdout] 21 | pub scan_result: ScanResult, [INFO] [stdout] 22 | pub policy_matches: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] 23 | pub ignored_vulnerabilities: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] 24 | pub prioritized_vulnerabilities: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `FilteredScanResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `get_policy_stats` is never used [INFO] [stdout] --> src/automation/policy.rs:291:12 [INFO] [stdout] | [INFO] [stdout] 27 | impl PolicyEngine { [INFO] [stdout] | ----------------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 291 | pub fn get_policy_stats(&self, filtered_result: &FilteredScanResult) -> PolicyStats { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `PolicyStats` is never constructed [INFO] [stdout] --> src/automation/policy.rs:315:12 [INFO] [stdout] | [INFO] [stdout] 315 | pub struct PolicyStats { [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variant `PackageParsing` is never constructed [INFO] [stdout] --> src/error.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 6 | pub enum VulfyError { [INFO] [stdout] | ---------- variant in this enum [INFO] [stdout] ... [INFO] [stdout] 29 | PackageParsing { message: String }, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `VulfyError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `scan_directory_recursive` and `scan_directory_flat` are never used [INFO] [stdout] --> src/scanner/mod.rs:284:14 [INFO] [stdout] | [INFO] [stdout] 97 | impl Scanner { [INFO] [stdout] | ------------ methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 284 | async fn scan_directory_recursive(&self, dir_path: &Path, _config: &ScanConfig) -> VulfyResult> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 315 | async fn scan_directory_flat(&self, dir_path: &Path) -> VulfyResult> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `matches` is never used [INFO] [stdout] --> src/automation/mod.rs:221:12 [INFO] [stdout] | [INFO] [stdout] 219 | impl ScanPolicy { [INFO] [stdout] | --------------- method in this implementation [INFO] [stdout] 220 | /// Check if a vulnerability matches this policy [INFO] [stdout] 221 | pub fn matches(&self, vulnerability: &Vulnerability) -> bool { [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `is_running` is never used [INFO] [stdout] --> src/automation/scheduler.rs:146:18 [INFO] [stdout] | [INFO] [stdout] 24 | impl AutomationScheduler { [INFO] [stdout] | ------------------------ method in this implementation [INFO] [stdout] ... [INFO] [stdout] 146 | pub async fn is_running(&self) -> bool { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `policy_name`, `vulnerability_id`, `package_name`, and `actions` are never read [INFO] [stdout] --> src/automation/policy.rs:13:9 [INFO] [stdout] | [INFO] [stdout] 12 | pub struct PolicyMatch { [INFO] [stdout] | ----------- fields in this struct [INFO] [stdout] 13 | pub policy_name: String, [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] 14 | pub vulnerability_id: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] 15 | pub package_name: String, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] 16 | pub actions: PolicyActions, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PolicyMatch` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `policy_matches`, `ignored_vulnerabilities`, and `prioritized_vulnerabilities` are never read [INFO] [stdout] --> src/automation/policy.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 20 | pub struct FilteredScanResult { [INFO] [stdout] | ------------------ fields in this struct [INFO] [stdout] 21 | pub scan_result: ScanResult, [INFO] [stdout] 22 | pub policy_matches: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] 23 | pub ignored_vulnerabilities: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] 24 | pub prioritized_vulnerabilities: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `FilteredScanResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `get_policy_stats` is never used [INFO] [stdout] --> src/automation/policy.rs:291:12 [INFO] [stdout] | [INFO] [stdout] 27 | impl PolicyEngine { [INFO] [stdout] | ----------------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 291 | pub fn get_policy_stats(&self, filtered_result: &FilteredScanResult) -> PolicyStats { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `PolicyStats` is never constructed [INFO] [stdout] --> src/automation/policy.rs:315:12 [INFO] [stdout] | [INFO] [stdout] 315 | pub struct PolicyStats { [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 1m 22s [INFO] running `Command { std: "docker" "inspect" "5cccf7ac51af08f47239ddecf4fe6181a9c29bbdd23af0691ce51453f0432064", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "5cccf7ac51af08f47239ddecf4fe6181a9c29bbdd23af0691ce51453f0432064", kill_on_drop: false }` [INFO] [stdout] 5cccf7ac51af08f47239ddecf4fe6181a9c29bbdd23af0691ce51453f0432064