[INFO] fetching crate vulfy 0.1.0... [INFO] testing vulfy-0.1.0 against try#b83b707f97d809763b7861afa7638871f3339a33 for pr-145838-1 [INFO] extracting crate vulfy 0.1.0 into /workspace/builds/worker-1-tc2/source [INFO] started tweaking crates.io crate vulfy 0.1.0 [INFO] finished tweaking crates.io crate vulfy 0.1.0 [INFO] tweaked toml for crates.io crate vulfy 0.1.0 written to /workspace/builds/worker-1-tc2/source/Cargo.toml [INFO] validating manifest of crates.io crate vulfy 0.1.0 on toolchain b83b707f97d809763b7861afa7638871f3339a33 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+b83b707f97d809763b7861afa7638871f3339a33" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate crates.io crate vulfy 0.1.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+b83b707f97d809763b7861afa7638871f3339a33" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:7ad1b28ee6f5f7f699f6cf7015098d6ccdd96d6f2d78dd06228f5b4c9faf309c" "/opt/rustwide/cargo-home/bin/cargo" "+b83b707f97d809763b7861afa7638871f3339a33" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 200aa5feefe62f432aad91df78211c55c0993f8611bcc2551e795ac8ddd8fc4f [INFO] running `Command { std: "docker" "start" "-a" "200aa5feefe62f432aad91df78211c55c0993f8611bcc2551e795ac8ddd8fc4f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "200aa5feefe62f432aad91df78211c55c0993f8611bcc2551e795ac8ddd8fc4f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "200aa5feefe62f432aad91df78211c55c0993f8611bcc2551e795ac8ddd8fc4f", kill_on_drop: false }` [INFO] [stdout] 200aa5feefe62f432aad91df78211c55c0993f8611bcc2551e795ac8ddd8fc4f [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:7ad1b28ee6f5f7f699f6cf7015098d6ccdd96d6f2d78dd06228f5b4c9faf309c" "/opt/rustwide/cargo-home/bin/cargo" "+b83b707f97d809763b7861afa7638871f3339a33" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] b535863b96aaacdde4ff4f926d1385f5e1224bd85297f775adba09aed93c8ab9 [INFO] running `Command { std: "docker" "start" "-a" "b535863b96aaacdde4ff4f926d1385f5e1224bd85297f775adba09aed93c8ab9", kill_on_drop: false }` [INFO] [stderr] Compiling libc v0.2.174 [INFO] [stderr] Compiling syn v2.0.104 [INFO] [stderr] Compiling hashbrown v0.15.4 [INFO] [stderr] Compiling slab v0.4.10 [INFO] [stderr] Compiling bitflags v2.9.1 [INFO] [stderr] Compiling syn v1.0.109 [INFO] [stderr] Compiling nom v7.1.3 [INFO] [stderr] Compiling regex-automata v0.4.9 [INFO] [stderr] Compiling winnow v0.7.11 [INFO] [stderr] Compiling tokio-cron-scheduler v0.10.2 [INFO] [stderr] Compiling toml_write v0.1.2 [INFO] [stderr] Compiling clap_builder v4.5.40 [INFO] [stderr] Compiling indexmap v2.9.0 [INFO] [stderr] Compiling jobserver v0.1.33 [INFO] [stderr] Compiling cc v1.2.27 [INFO] [stderr] Compiling parking_lot_core v0.9.11 [INFO] [stderr] Compiling parking_lot v0.12.4 [INFO] [stderr] Compiling signal-hook-registry v1.4.5 [INFO] [stderr] Compiling mio v1.0.4 [INFO] [stderr] Compiling socket2 v0.5.10 [INFO] [stderr] Compiling getrandom v0.3.3 [INFO] [stderr] Compiling regex v1.11.1 [INFO] [stderr] Compiling encoding_rs v0.8.35 [INFO] [stderr] Compiling num-derive v0.3.3 [INFO] [stderr] Compiling thread_local v1.1.9 [INFO] [stderr] Compiling quick-xml v0.36.2 [INFO] [stderr] Compiling glob v0.3.2 [INFO] [stderr] Compiling openssl-sys v0.9.109 [INFO] [stderr] Compiling libz-sys v1.1.22 [INFO] [stderr] Compiling libssh2-sys v0.3.1 [INFO] [stderr] Compiling openssl v0.10.73 [INFO] [stderr] Compiling native-tls v0.2.14 [INFO] [stderr] Compiling libgit2-sys v0.16.2+1.7.2 [INFO] [stderr] Compiling synstructure v0.13.2 [INFO] [stderr] Compiling zerofrom-derive v0.1.6 [INFO] [stderr] Compiling yoke-derive v0.8.0 [INFO] [stderr] Compiling zerovec-derive v0.11.1 [INFO] [stderr] Compiling displaydoc v0.2.5 [INFO] [stderr] Compiling serde_derive v1.0.219 [INFO] [stderr] Compiling tokio-macros v2.5.0 [INFO] [stderr] Compiling tracing-attributes v0.1.30 [INFO] [stderr] Compiling futures-macro v0.3.31 [INFO] [stderr] Compiling openssl-macros v0.1.1 [INFO] [stderr] Compiling clap_derive v4.5.40 [INFO] [stderr] Compiling zerofrom v0.1.6 [INFO] [stderr] Compiling yoke v0.8.0 [INFO] [stderr] Compiling tokio v1.45.1 [INFO] [stderr] Compiling zerovec v0.11.2 [INFO] [stderr] Compiling zerotrie v0.2.2 [INFO] [stderr] Compiling futures-util v0.3.31 [INFO] [stderr] Compiling tracing v0.1.41 [INFO] [stderr] Compiling thiserror-impl v1.0.69 [INFO] [stderr] Compiling tinystr v0.8.1 [INFO] [stderr] Compiling icu_locale_core v2.0.0 [INFO] [stderr] Compiling potential_utf v0.1.2 [INFO] [stderr] Compiling icu_collections v2.0.0 [INFO] [stderr] Compiling thiserror v1.0.69 [INFO] [stderr] Compiling icu_provider v2.0.0 [INFO] [stderr] Compiling icu_properties v2.0.1 [INFO] [stderr] Compiling icu_normalizer v2.0.0 [INFO] [stderr] Compiling clap v4.5.40 [INFO] [stderr] Compiling tracing-subscriber v0.3.19 [INFO] [stderr] Compiling serde v1.0.219 [INFO] [stderr] Compiling idna_adapter v1.2.1 [INFO] [stderr] Compiling idna v1.0.3 [INFO] [stderr] Compiling futures-executor v0.3.31 [INFO] [stderr] Compiling url v2.5.4 [INFO] [stderr] Compiling futures v0.3.31 [INFO] [stderr] Compiling tokio-util v0.7.15 [INFO] [stderr] Compiling chrono v0.4.41 [INFO] [stderr] Compiling toml_datetime v0.6.11 [INFO] [stderr] Compiling serde_spanned v0.6.9 [INFO] [stderr] Compiling tokio-native-tls v0.3.1 [INFO] [stderr] Compiling h2 v0.3.26 [INFO] [stderr] Compiling toml_edit v0.22.27 [INFO] [stderr] Compiling serde_json v1.0.140 [INFO] [stderr] Compiling serde_urlencoded v0.7.1 [INFO] [stderr] Compiling uuid v1.17.0 [INFO] [stderr] Compiling cron v0.12.1 [INFO] [stderr] Compiling toml v0.8.23 [INFO] [stderr] Compiling hyper v0.14.32 [INFO] [stderr] Compiling hyper-tls v0.5.0 [INFO] [stderr] Compiling reqwest v0.11.27 [INFO] [stderr] Compiling git2 v0.18.3 [INFO] [stderr] Compiling vulfy v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: variant `PackageParsing` is never constructed [INFO] [stdout] --> src/error.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 6 | pub enum VulfyError { [INFO] [stdout] | ---------- variant in this enum [INFO] [stdout] ... [INFO] [stdout] 29 | PackageParsing { message: String }, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `VulfyError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `scan_directory_recursive` and `scan_directory_flat` are never used [INFO] [stdout] --> src/scanner/mod.rs:284:14 [INFO] [stdout] | [INFO] [stdout] 97 | impl Scanner { [INFO] [stdout] | ------------ methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 284 | async fn scan_directory_recursive(&self, dir_path: &Path, _config: &ScanConfig) -> VulfyResult> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 315 | async fn scan_directory_flat(&self, dir_path: &Path) -> VulfyResult> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `matches` is never used [INFO] [stdout] --> src/automation/mod.rs:221:12 [INFO] [stdout] | [INFO] [stdout] 219 | impl ScanPolicy { [INFO] [stdout] | --------------- method in this implementation [INFO] [stdout] 220 | /// Check if a vulnerability matches this policy [INFO] [stdout] 221 | pub fn matches(&self, vulnerability: &Vulnerability) -> bool { [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `is_running` is never used [INFO] [stdout] --> src/automation/scheduler.rs:146:18 [INFO] [stdout] | [INFO] [stdout] 24 | impl AutomationScheduler { [INFO] [stdout] | ------------------------ method in this implementation [INFO] [stdout] ... [INFO] [stdout] 146 | pub async fn is_running(&self) -> bool { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `policy_name`, `vulnerability_id`, `package_name`, and `actions` are never read [INFO] [stdout] --> src/automation/policy.rs:13:9 [INFO] [stdout] | [INFO] [stdout] 12 | pub struct PolicyMatch { [INFO] [stdout] | ----------- fields in this struct [INFO] [stdout] 13 | pub policy_name: String, [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] 14 | pub vulnerability_id: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] 15 | pub package_name: String, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] 16 | pub actions: PolicyActions, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PolicyMatch` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `policy_matches`, `ignored_vulnerabilities`, and `prioritized_vulnerabilities` are never read [INFO] [stdout] --> src/automation/policy.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 20 | pub struct FilteredScanResult { [INFO] [stdout] | ------------------ fields in this struct [INFO] [stdout] 21 | pub scan_result: ScanResult, [INFO] [stdout] 22 | pub policy_matches: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] 23 | pub ignored_vulnerabilities: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] 24 | pub prioritized_vulnerabilities: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `FilteredScanResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `get_policy_stats` is never used [INFO] [stdout] --> src/automation/policy.rs:291:12 [INFO] [stdout] | [INFO] [stdout] 27 | impl PolicyEngine { [INFO] [stdout] | ----------------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 291 | pub fn get_policy_stats(&self, filtered_result: &FilteredScanResult) -> PolicyStats { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `PolicyStats` is never constructed [INFO] [stdout] --> src/automation/policy.rs:315:12 [INFO] [stdout] | [INFO] [stdout] 315 | pub struct PolicyStats { [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 2m 37s [INFO] running `Command { std: "docker" "inspect" "b535863b96aaacdde4ff4f926d1385f5e1224bd85297f775adba09aed93c8ab9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "b535863b96aaacdde4ff4f926d1385f5e1224bd85297f775adba09aed93c8ab9", kill_on_drop: false }` [INFO] [stdout] b535863b96aaacdde4ff4f926d1385f5e1224bd85297f775adba09aed93c8ab9 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:7ad1b28ee6f5f7f699f6cf7015098d6ccdd96d6f2d78dd06228f5b4c9faf309c" "/opt/rustwide/cargo-home/bin/cargo" "+b83b707f97d809763b7861afa7638871f3339a33" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 3014b50c6f173e7abc74dc1a32f5fa3af12e0bf29c67f5097b5b37f096464fdc [INFO] running `Command { std: "docker" "start" "-a" "3014b50c6f173e7abc74dc1a32f5fa3af12e0bf29c67f5097b5b37f096464fdc", kill_on_drop: false }` [INFO] [stderr] Compiling tokio v1.45.1 [INFO] [stderr] Compiling openssl v0.10.73 [INFO] [stderr] Compiling rustix v1.0.7 [INFO] [stderr] Compiling async-stream-impl v0.3.6 [INFO] [stderr] Compiling git2 v0.18.3 [INFO] [stderr] Compiling async-stream v0.3.6 [INFO] [stderr] Compiling tempfile v3.20.0 [INFO] [stderr] Compiling native-tls v0.2.14 [INFO] [stderr] Compiling tokio-util v0.7.15 [INFO] [stderr] Compiling tokio-native-tls v0.3.1 [INFO] [stderr] Compiling tokio-stream v0.1.17 [INFO] [stderr] Compiling tokio-cron-scheduler v0.10.2 [INFO] [stderr] Compiling tokio-test v0.4.4 [INFO] [stderr] Compiling h2 v0.3.26 [INFO] [stderr] Compiling hyper v0.14.32 [INFO] [stderr] Compiling hyper-tls v0.5.0 [INFO] [stderr] Compiling reqwest v0.11.27 [INFO] [stderr] Compiling vulfy v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: variant `PackageParsing` is never constructed [INFO] [stdout] --> src/error.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 6 | pub enum VulfyError { [INFO] [stdout] | ---------- variant in this enum [INFO] [stdout] ... [INFO] [stdout] 29 | PackageParsing { message: String }, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `VulfyError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: methods `scan_directory_recursive` and `scan_directory_flat` are never used [INFO] [stdout] --> src/scanner/mod.rs:284:14 [INFO] [stdout] | [INFO] [stdout] 97 | impl Scanner { [INFO] [stdout] | ------------ methods in this implementation [INFO] [stdout] ... [INFO] [stdout] 284 | async fn scan_directory_recursive(&self, dir_path: &Path, _config: &ScanConfig) -> VulfyResult> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 315 | async fn scan_directory_flat(&self, dir_path: &Path) -> VulfyResult> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `matches` is never used [INFO] [stdout] --> src/automation/mod.rs:221:12 [INFO] [stdout] | [INFO] [stdout] 219 | impl ScanPolicy { [INFO] [stdout] | --------------- method in this implementation [INFO] [stdout] 220 | /// Check if a vulnerability matches this policy [INFO] [stdout] 221 | pub fn matches(&self, vulnerability: &Vulnerability) -> bool { [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `is_running` is never used [INFO] [stdout] --> src/automation/scheduler.rs:146:18 [INFO] [stdout] | [INFO] [stdout] 24 | impl AutomationScheduler { [INFO] [stdout] | ------------------------ method in this implementation [INFO] [stdout] ... [INFO] [stdout] 146 | pub async fn is_running(&self) -> bool { [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `policy_name`, `vulnerability_id`, `package_name`, and `actions` are never read [INFO] [stdout] --> src/automation/policy.rs:13:9 [INFO] [stdout] | [INFO] [stdout] 12 | pub struct PolicyMatch { [INFO] [stdout] | ----------- fields in this struct [INFO] [stdout] 13 | pub policy_name: String, [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] 14 | pub vulnerability_id: String, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] 15 | pub package_name: String, [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] 16 | pub actions: PolicyActions, [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `PolicyMatch` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: fields `policy_matches`, `ignored_vulnerabilities`, and `prioritized_vulnerabilities` are never read [INFO] [stdout] --> src/automation/policy.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 20 | pub struct FilteredScanResult { [INFO] [stdout] | ------------------ fields in this struct [INFO] [stdout] 21 | pub scan_result: ScanResult, [INFO] [stdout] 22 | pub policy_matches: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] 23 | pub ignored_vulnerabilities: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] 24 | pub prioritized_vulnerabilities: Vec, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `FilteredScanResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: method `get_policy_stats` is never used [INFO] [stdout] --> src/automation/policy.rs:291:12 [INFO] [stdout] | [INFO] [stdout] 27 | impl PolicyEngine { [INFO] [stdout] | ----------------- method in this implementation [INFO] [stdout] ... [INFO] [stdout] 291 | pub fn get_policy_stats(&self, filtered_result: &FilteredScanResult) -> PolicyStats { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `PolicyStats` is never constructed [INFO] [stdout] --> src/automation/policy.rs:315:12 [INFO] [stdout] | [INFO] [stdout] 315 | pub struct PolicyStats { [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 45.01s [INFO] running `Command { std: "docker" "inspect" "3014b50c6f173e7abc74dc1a32f5fa3af12e0bf29c67f5097b5b37f096464fdc", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "3014b50c6f173e7abc74dc1a32f5fa3af12e0bf29c67f5097b5b37f096464fdc", kill_on_drop: false }` [INFO] [stdout] 3014b50c6f173e7abc74dc1a32f5fa3af12e0bf29c67f5097b5b37f096464fdc [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:7ad1b28ee6f5f7f699f6cf7015098d6ccdd96d6f2d78dd06228f5b4c9faf309c" "/opt/rustwide/cargo-home/bin/cargo" "+b83b707f97d809763b7861afa7638871f3339a33" "test" "--frozen", kill_on_drop: false }` [INFO] [stdout] fd8d5fb0dbad1887d8dba0143f0d8350ea2e761621e5a324eb9c53155a88cf17 [INFO] running `Command { std: "docker" "start" "-a" "fd8d5fb0dbad1887d8dba0143f0d8350ea2e761621e5a324eb9c53155a88cf17", kill_on_drop: false }` [INFO] [stderr] warning: variant `PackageParsing` is never constructed [INFO] [stderr] --> src/error.rs:29:5 [INFO] [stderr] | [INFO] [stderr] 6 | pub enum VulfyError { [INFO] [stderr] | ---------- variant in this enum [INFO] [stderr] ... [INFO] [stderr] 29 | PackageParsing { message: String }, [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `VulfyError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stderr] = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default [INFO] [stderr] [INFO] [stderr] warning: methods `scan_directory_recursive` and `scan_directory_flat` are never used [INFO] [stderr] --> src/scanner/mod.rs:284:14 [INFO] [stderr] | [INFO] [stderr] 97 | impl Scanner { [INFO] [stderr] | ------------ methods in this implementation [INFO] [stderr] ... [INFO] [stderr] 284 | async fn scan_directory_recursive(&self, dir_path: &Path, _config: &ScanConfig) -> VulfyResult> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] ... [INFO] [stderr] 315 | async fn scan_directory_flat(&self, dir_path: &Path) -> VulfyResult> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: method `matches` is never used [INFO] [stderr] --> src/automation/mod.rs:221:12 [INFO] [stderr] | [INFO] [stderr] 219 | impl ScanPolicy { [INFO] [stderr] | --------------- method in this implementation [INFO] [stderr] 220 | /// Check if a vulnerability matches this policy [INFO] [stderr] 221 | pub fn matches(&self, vulnerability: &Vulnerability) -> bool { [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: method `is_running` is never used [INFO] [stderr] --> src/automation/scheduler.rs:146:18 [INFO] [stderr] | [INFO] [stderr] 24 | impl AutomationScheduler { [INFO] [stderr] | ------------------------ method in this implementation [INFO] [stderr] ... [INFO] [stderr] 146 | pub async fn is_running(&self) -> bool { [INFO] [stderr] | ^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: fields `policy_name`, `vulnerability_id`, `package_name`, and `actions` are never read [INFO] [stderr] --> src/automation/policy.rs:13:9 [INFO] [stderr] | [INFO] [stderr] 12 | pub struct PolicyMatch { [INFO] [stderr] | ----------- fields in this struct [INFO] [stderr] 13 | pub policy_name: String, [INFO] [stderr] | ^^^^^^^^^^^ [INFO] [stderr] 14 | pub vulnerability_id: String, [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] 15 | pub package_name: String, [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] 16 | pub actions: PolicyActions, [INFO] [stderr] | ^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `PolicyMatch` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stderr] [INFO] [stderr] warning: fields `policy_matches`, `ignored_vulnerabilities`, and `prioritized_vulnerabilities` are never read [INFO] [stderr] --> src/automation/policy.rs:22:9 [INFO] [stderr] | [INFO] [stderr] 20 | pub struct FilteredScanResult { [INFO] [stderr] | ------------------ fields in this struct [INFO] [stderr] 21 | pub scan_result: ScanResult, [INFO] [stderr] 22 | pub policy_matches: Vec, [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] 23 | pub ignored_vulnerabilities: Vec, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] 24 | pub prioritized_vulnerabilities: Vec, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `FilteredScanResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis [INFO] [stderr] [INFO] [stderr] warning: method `get_policy_stats` is never used [INFO] [stderr] --> src/automation/policy.rs:291:12 [INFO] [stderr] | [INFO] [stderr] 27 | impl PolicyEngine { [INFO] [stderr] | ----------------- method in this implementation [INFO] [stderr] ... [INFO] [stderr] 291 | pub fn get_policy_stats(&self, filtered_result: &FilteredScanResult) -> PolicyStats { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: struct `PolicyStats` is never constructed [INFO] [stderr] --> src/automation/policy.rs:315:12 [INFO] [stderr] | [INFO] [stderr] 315 | pub struct PolicyStats { [INFO] [stderr] | ^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: `vulfy` (bin "vulfy" test) generated 8 warnings [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 0.26s [INFO] [stderr] Running unittests src/main.rs (/opt/rustwide/target/debug/deps/vulfy-6ceeb01e2ac5bf98) [INFO] [stdout] [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "fd8d5fb0dbad1887d8dba0143f0d8350ea2e761621e5a324eb9c53155a88cf17", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "fd8d5fb0dbad1887d8dba0143f0d8350ea2e761621e5a324eb9c53155a88cf17", kill_on_drop: false }` [INFO] [stdout] fd8d5fb0dbad1887d8dba0143f0d8350ea2e761621e5a324eb9c53155a88cf17